Professional Documents
Culture Documents
net/publication/372217044
CITATIONS READS
0 172
3 authors, including:
SEE PROFILE
All content following this page was uploaded by Chai Ching Tan on 08 July 2023.
FAI-Conference Proceedings
(VOL: 2, 2020)
International Conference on
Engineering , Mathematical
and Computational Intelligence
(ICEMCI 2019)
DEC, 21 - 23 | 2019
Jabalpur, Madhya Pradesh, India
Editors
Pankaj Srivastava
C.C. Tan
Disclaimer
The responsibility for opinions expressed, in articles, studies and other
contributions in this publication rests solely with their authors, and this
publication does not constitute an endorsement by the ICEMCI 2019 of the
opinions so expressed in them.
ISBN :978-81-945631-7-4
1
Organized By
• FATER Academy of India
• Jabalpur Engineering College, Jabalpur, Madhya Pradesh, India
• Walchand Engineering College, Sangli, Maharashtra, India
2
• Prof Manu Sood, HPU, Shimla
• Er. Vinay Thakur, Ministry of Electronics and IT, Govt. of India
• Lt. Gen. A. T. Parnaik, Pune, India
• Brig. Praveen Kumar, Pune, India
• Maj. Gen. M. P. Singh, Vice President, FAI
• Prof. B. K. Koushik , IIT Roorkee
• Prof. Sameer Khandekar, IIIT Kanpur
• Prof. Tripti Jain, IIT INDORE
• Prof. Indraneel Sen , IIT Kharagpur
• Prof. C.P.Gupta, IIT Roorkee
• Prof. Satyendra Narayana, Sheridan Institute of Technology, Ontario Canada
• Dr. Poom Kumam, KMUTT Bangkok
• Prof. Uday Khedkar, IIT, Bombay
• Prof. N.K.Samadiya , IIT, Roorkee
• Prof. Seema Saxena, SPIU, BHOPAL
• Prof. L. M. Thivagar, M. K. University, Madurai, India
• Prof Rajiv Saxena, JP University, Anoop Shahar
• Prof. V. Kamraju, Hyderabad University
• Prof. Rakesh Saxena, SGSITS, Indore
• Prof. Aparajita Ojha, IIITDM, Jabalpur
• Prof Pritee Khanna, IIITDM, Jabalpur
• Prof. P.V. Jain, RDVV Jabalpur
• Prof. M. Dube, RDVV Jabalpur
• Prof. S. S. Rana, RDVV Jabalpur
• Prof. Puneet Tandon, IIITDM, Jabalpur
• Prof. Prashant Jain, IIITDM, Jabalpur
• Prof. S. C. Choubey, RGPV Bhopal
• Dr. Manoj Meshram, IITBHU
• Dr. A.K. Singh, IITBHU
• Dr. Biswajeet Mukharjee, IIITDM, JABALPUR
• Prof. Kanak Saxena, SATI Vidisha
• Prof. Laxmi Shrivastava , MITS, Gwalior
• Prof. N S Choudhary, UTU, Dehradun
• Prof. Jyoti Singhai, MANIT, Bhopal
• Prof. Nilay Khare, MANIT,Bhopal
• Prof. Savita Nema, MANIT,Bhopal
• Prof. Manisha Dubey, MANIT,Bhopal
• Prof. R.K Nema, MANIT,Bhopal
• Dr. P.J. Kulkarni, WCE, Sangli
• Dr. B F Momin, WCE, Sangli
• Prof. V.B. Dharmadhikari, WCE, Sangli
• Dr. Sumantra Dutta Roy, IIT, Delhi
3
Organising Committee
• Conference Chair
Prof. S. S. Thakur,
Principal, Jabalpur Engineering College, Jabalpur
• Program chair
Prof. Shailja Shukla, HOD , CSE Department ,JEC
• Registration Committee
Prof. Jyoti Bajpai
Prof. Mahima Thakur
• Accommodation Committee
Prof. M. P. Parsai
Prof. Ruchi Nigam
4
Preface
With the zest to boost Research and Development at international platform, FATER
Academy of India has organized 16th International Conference on “Engineering and
Mathematical Computational Intelligence”, 21st to 23rd December 2019 at Jabalpur
Engineering College, Jabalpur M.P, India. It gives me immense pleasure in writing this
message as an Editor of this proceeding. The FAI Conference Proceedings includes oral
presentations provided by enthusiastic students, practicing researchers, industry personalities
and academicians. The idea behind the publication of this conference proceeding was to help
and motivate researchers to carry forward their work to the next level.
I extend my warmest thanks to the authors for their interest, enthusiasm and timely
submission of full-length research papers and reviewers for their quick responses with valuable
suggestions to improve the articles. As Editor of FAI Vol2,2020, I anticipate that the
proceedings would be of immense value and will be definitely useful to researchers in their
practice or thinking process. This collection will also offer a window for new perspectives and
directions in the respective horizons. I hope that reading this proceeding will have an impact
on and encourage you to have an impact on others. We may never know how much our words
or action influence the lives of those around us. But we can choose daily to be a positive
influence on others in a way that could change the rest of their lives even if it is just within the
walls of where you work.
5
4 September, 2020
As an editor of this proceeding and the vice president of FATER Academy of India, we
are pleased to congratulate the successful presentation of many quality research papers at the
International Conference on Engineering, Mathematical and Computational Intelligence
(ICEMCI 2019), on December 21-23, 2019, held at Jabalpur Engineering College, Jabalpur,
Madhya Pradesh, India. The collaborating partners involve reputable FATER Academy of
India, Jabalpur Engineering College and Walchand Engineering College, and was sponsored
by TEQIP-III.
Clearly the multidisciplinary forum was successfully executed and delivered the golden
value of being multidisciplinary, especially involving mathematics, computation and
engineering. While mathematics serves as an important foundation and takes on a natural
complementary disciplinary role to support and drive the development of engineering and
computational sophistication, the engineering and computational professions apply
mathematics knowledge to develop ways to utilize, economically, the materials and forces of
nature for the benefit of mankind. Thus, together, they form the backbone of a nation’s
economy. This conference brought together eight important themes (mechanical and industrial
engineering, civil and environmental engineering, electrical and electronics engineering,
computer and information technology, pure and fuzzy mathematics, computational
mathematics, optimization techniques, and probabilistic and computation learning to meet the
21st century needs.
Through sharing and exchanging of knowledge and research-based discoveries, many
ideas were revealed to enable us to be more open-minded to other disciplines, whether of their
findings, methods, applications, and ways of thoughts.
Once again, congratulations to everyone participated in the conference, and with the
wholehearted gratitude to your dedication.
Thank you.
6
Table of Contents
No. Chapter Name Page
1 Design and Development of Soft computing Information system to assess
the impact of Spirituality on learning features 7-21
1drpankajsrivastava23@gmail.com
2rajkrishna@mnnit.ac.in
Abstract.In the present paper, we deal with the design and development of Soft
Computing base Information system to assess impact of Spiritual aspect on
Learning by using the concept of generating Linguistic Strings through non-
linear Fuzzy Membership Functions. The proposed system, on one hand, will
help in adopting a proper strategy to evaluate his present level of Spirituality
aspect on Learning and follow a balanced lifestyle. On the other hand, it will
provide a qualitative base detecting system to take a proper action. The pro-
posed information system is tested on real-life data with a satisfactory result as
per the various experts.
1 Introduction
ISBN :978-81-945631-7-4
7
The Spritual leaders such as Gautama Buddha, Adi Shankaracarya,Swami Viveka-
nanda, Maharishi Mahesh Yogi, Neem Karauli Baba,Sadguru and many more , who
taught to millions of people such as business people and students ; the worldwide.
Facebook founder Mark Zuckerberg mentioned that he had visited a temple in India
during the initial days of Facebook on the advice of late Apple founder Steve Jobs,
according to an Economic Times report. “ Steve Jobs is said to have got the vision for
creating Apple after he visited the Kainchi Dham ashram.” Srivastava Pankaj and
coworkers(5,6,7,8,9,10,11,12) developed a good number Intelligent systems with the
help of Soft Computing tools to handle the issues concerned with real life problems.
In the present paper, we deal with the design and development of Soft Computing
based Information system to assess the impact of Spirituality on Learning features.
In this section we are interested to study that, how Spirituality effects on Learning
Mechanism? Using Soft Computing tools mainly Fuzzy Techniques, and our daily
life style (like. Meditation, Association with spiritual organization, intuition), envi-
ronmental factors (like Aura, Spiritual environments where the candidate stay, Family
Background), Age, Gender. We have made an attempt to capture that how the Spir-
ituality effects on our Learning mechanism. In order to develop the proposed system,
we consider Fuzzy sets, Membership functions namely Triangular membership func-
tion, Traphizoidal membership function, Gaussian membership function and Sig-
moidal Membership function as primary tools which are as follows:
0, 𝑥≤𝑎
𝑥−𝑎
, 𝑎≤𝑥≤𝑏
𝑏−𝑎
.𝑇𝑟𝑖𝑚𝑓(𝑥, [𝑎, 𝑏, 𝑐]) = 𝑐−𝑥
, 𝑏≤𝑥≤𝑐
𝑐−𝑏
{ 0, 𝑐≤𝑥
0, 𝑥≤𝑎
𝑥−𝑎
, 𝑎≤𝑥≤𝑏
𝑏−𝑎
𝑡𝑟𝑎𝑝𝑚𝑓(𝑥, [𝑎, 𝑏, 𝑐, 𝑑]) = 1, 𝑏≤𝑥≤𝑐
𝑑−𝑥
, 𝑐≤𝑥≤𝑑
𝑑−𝑐
{ 0, 𝑑≤𝑥
−(𝑥−𝑐)2
𝑔𝑎𝑢𝑠𝑠𝑚𝑓(𝑥, [𝜎, 𝑐]) = 𝑒 2𝜎2
1
𝑠𝑖𝑔𝑚𝑓(𝑥, [𝑎, 𝑐]) =
1+𝑒 −𝑎(𝑥−𝑐)
ISBN :978-81-945631-7-4
8
Fig. 1. Various kind of Fuzzy Membership Functions
According to Daily life style, Environmental Factors and Personal Information it clas-
sified as eight factors.
Meditation (Input 1)
ISBN :978-81-945631-7-4
9
Association with Spiritual Organization (Input 2)
Nothing (N) 0 0
Low (L) Yearly sigmf(x, [0.0702, 276.7])
Moderate (M) Monthly gaussmf(x, [49.34 189])
Active (A) Weekly gaussmf(x, [22.9 86.81])
Hyperactive (H) Daily sigmf(x, [-0.2616 20.7])
Intuition (Input 3)
ISBN :978-81-945631-7-4
10
Aura (Input 4)
ISBN :978-81-945631-7-4
11
Family Background (Input 6)
Age (Input 7)
ISBN :978-81-945631-7-4
12
Gender (Input 8)
ISBN :978-81-945631-7-4
13
2.4 Linguistic Strings
According to the various literature survey for each 8 input criteria taking the im-
portance between 1 to 8 where 8: most important and 1 most less important. Then
normalize this value between 0 to 1.
Input 1: 5, Input 2: 3, Input3:7, Input 4:4, Input 5:8, Input 6:6, Input 7:2, Input 8:1
So, the importance vector for these input variable will be: imp=[5, 3, 7, 4, 8, 6, 2, 1]
From Input Variables section it is seen that for 8 input variables there have 5, 5, 5, 5,
5, 4, 5, 3 corresponding membership functions. If we make the combinations of all the
input variables then we can make 5 ∗ 5 ∗ 5 ∗ 5 ∗ 5 ∗ 4 ∗ 5 ∗ 3 = 187500 no. of com-
bination.
Each combination of its is called the linguistic strings whose tabular form is given
below
String No. Input Input Input Input Input Input Input Input
1 2 3 4 5 6 7 8
𝑱𝟏 LE N E EP VL L Y M
𝑱𝟐 LE N E EP VL L Y F
⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
𝑱𝟐𝟗𝟏𝟔 VE M M A M M A F
⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
𝑱𝟏𝟖𝟕𝟒𝟗𝟗 EE H N EN VH H O F
𝑱𝟏𝟖𝟕𝟓𝟎𝟎 EE H N EN VH H O T
ISBN :978-81-945631-7-4
14
Table 2.Relation Matrix for 8 INPUT factors
EP P A N EN VL L M H VH L M A H
EH 5 4 3 2 1 1 2 3 4 5 1 3 4 5
H 4 4 3 2 2 2 2 3 3 4 2 3 4 4
A 3 3 3 3 3 3 3 3 3 3 3 3 4 3
L 2 2 3 4 4 4 4 3 2 2 4 4 3 2
EL 1 2 3 4 5 5 4 3 2 1 5 4 3 1
Age (INPUT 7) Gender (INPUT 8)
Y MA A VA O M F T
EH 3 4 5 4 3 5 3 4
H 4 5 4 5 4 4 4 5
A 5 5 3 3 5 3 5 3
L 4 3 2 3 4 2 4 3
EL 3 2 1 2 3 1 3 2
Association
Input 3 Input 4
Intuition
Calculate the
Aura combination of each
START
Input 5 Input 6 relation matrix
Environment
Input 7 Input 8
Background Each row is multiplied by
W
Age
Rounding off and Normalize between 1 to 100
Gender
Generate Utility Matrix
Weighting
Value for
each Input
END
factors (W)
ISBN :978-81-945631-7-4
15
From the above graphical structure, it is shown that:
1. With the help of doctors and medical experts for each input variables according
to the importance criteria create weighting values W.
2. For each input variable, since there have various membership functions, therefore
for each input variables and corresponding to each membership functions we de-
veloped the relation matrix with the help of various literature survey.
3. According to the linguistic strings and with the help of W and Relation Ma-
trix(Shown in Table 2)create the utility data. Combining all the utility data we
create utility matrix.
If we map all the values between [1, 5] to [1,100] by using the linear function
(𝑥−5)/(5−1)=(𝑦−100)/(100−1)⇒𝑦=100+(99(𝑥−5))/4.
So, if we take x=2.4444 then y will be 36.7489 and after round off we get 37.
There the Utility value of 𝑱𝟏 for Normal output variable is 37. The details are shown
below.
Table 3.Utility Data of various output Factors corresponding to each linguistic string
EH 37 51 49 ⋯ 52 ⋯ 19 17 14
H 43 23 28 ⋯ 22 ⋯ 57 53 51
A 55 22 19 ⋯ 24 ⋯ 74 74 71
L 27 19 21 ⋯ 17 ⋯ 82 84 87
EL 19 15 29 ⋯ 25 ⋯ 79 81 76
ISBN :978-81-945631-7-4
16
2.6 Methodology
Showing the
Spiritual level of STOP
START the candidate
YES
User INPUT the
data for 8 Input
factors
Maximum Elements
YES
3 Experimental Results
N.B. The used data of these experiments are collected from the local candidate,
Prayagraj, India.
ISBN :978-81-945631-7-4
17
3.1 Experiment 1
𝐿𝐸 𝑆𝐸 𝑉𝐸 𝑉𝑉𝐸 𝐸𝐸
Meditation
. 1257 0.8542 0.7792 0.4983 0.0141
𝑁 𝐿 𝑀 𝐴 𝐻
Association
0.0630 0.6869 0.9350 0.5560 0.1419
𝐸 𝐻 𝑀 𝐿 𝑁
Intuition
0.0004 0.0222 0.8966 0.6325 0.0003
𝐸𝑃 𝑃 𝐴 𝑁 𝐸𝑁
Aura
0.1245 0.6892 0.4408 0.1702 0.0161
𝑉𝐿 𝐿 𝑀 𝐻 𝑉𝐻
Spiritual Environments 0.1018
0.1793 0.6596 0.9790 0.4018
𝐿 𝑀 𝐴 𝐻
Family Background
0.4110 0.8111 0.2356 0.1824
𝑌 𝑀A 𝐴 V𝐴 O
Age 0.1203
0.1067 0.4060 0.6394 0.4903
𝑀 𝐹 𝑇
Gender
1 0 0
𝜇(𝑗𝑖 ) 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422
ISBN :978-81-945631-7-4
18
Table 6.Calculation for Decision Making Algorithm (Experiment 1)
𝑈2 21 23 28 ⋯ 52 19 21 ⋯ 57 53 51
𝑓 ⋯ ⋯
𝑈2 0.1039 0.1151 0.1735 0.1765 0.2217 0.2329 0.1105 0.1137 0.0422
𝑓
𝑈2𝑚 0.2100 0.2300 0.2800 ⋯ 0.5200 0.1900 0.2100 ⋯ 0.5700 0.5300 0.5100
𝑓
𝑈2𝑜 0.1039 0.1151 0.1735 ⋯ 0.1765 0.1900 0.2100 ⋯ 0.1105 0.1137 0.0422
𝑈3 24 22 19 ⋯ 65 27 25 ⋯ 74 74 71
𝑓
𝑈3 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422
𝑓
𝑈3𝑚 0.2400 0.2200 0.1900 ⋯ 0.6500 0.2700 0.2500 ⋯ 0.7400 0.7400 0.7100
𝑓
𝑈3𝑜 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422
𝑈4 17 19 21 ⋯ 90 14 17 ⋯ 82 84 87
𝑓
𝑈4 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422
𝑓
𝑈4𝑚 0.1700 0.1900 0.2100 ⋯ 0.9000 0.1400 0.1700 ⋯ 0.8200 0.8400 0.8700
𝑓 ⋯ ⋯
𝑈4𝑜 0.1039 0.1151 0.1735 0.1765 0.1400 0.1700 0.1105 0.1137 0.0422
The decision making process yields an alternative optimal (𝐴𝑂 ) that provides various
phases of output:
𝑓
4. 𝐸𝑥𝑡𝑟𝑒𝑚𝑒𝑙𝑦 𝐻𝑖𝑔ℎ = 𝑀𝑎𝑥{𝑈1𝑂 } = 0.4019,
𝒇
5. 𝑯𝒊𝒈𝒉 = 𝑴𝒂𝒙{𝑼𝟐𝑶 } = 𝟎. 𝟔𝟕𝟕𝟐,
𝑓
6. 𝐴𝑣𝑒𝑟𝑎𝑔𝑒 = 𝑀𝑎𝑥{𝑈3𝑂 } = 0.6304,
𝑓
7. 𝐿𝑜𝑤 = 𝑀𝑎𝑥{𝑈4𝑂 } = 0.4513.
𝑓
8. E𝑥𝑡𝑟𝑒𝑚𝑒𝑙𝑦 𝐿𝑜𝑤 = 𝑀𝑎𝑥{𝑈5𝑂 } = 0.3013.
From the above decision layer, it is clearly indicated that Experiment 1 Candidate is
having a close possibility of Highly Spiritual.
ISBN :978-81-945631-7-4
19
3.2 Experiment 2
𝐿𝐸 𝑆𝐸 𝑉𝐸 𝑉𝑉𝐸 𝐸𝐸
Meditation
. 1249 0.4531 0.8562 0.4793 0.0251
𝑁 𝐿 𝑀 𝐴 𝐻
Association
0.0330 0.5769 0.6450 0.8570 0.4419
𝐸 𝐻 𝑀 𝐿 𝑁
Intuition
0.9564 0.6542 0.4956 0.1225 0.0001
𝐸𝑃 𝑃 𝐴 𝑁 𝐸𝑁
Aura
0.4575 0.7892 0.4878 0.1502 0.0267
𝑉𝐿 𝐿 𝑀 𝐻 𝑉𝐻
Spiritual Environments 0.4034
0.1753 0.2796 0.4890 0.7028
𝐿 𝑀 𝐴 𝐻
Family Background
0.2810 0.6051 0.9856 0.7934
𝑌 𝑀A 𝐴 V𝐴 O
Age 0.1163
0.3087 0.8069 0.5684 0.2853
𝑀 𝐹 𝑇
Gender
0 1 0
From the above decision layer, it is clearly indicated that Experiment 2 Candidate is
having a close possibility of 𝑬𝒙𝒕𝒓𝒆𝒎𝒆𝒍𝒚 𝑯𝒊𝒈𝒉Spiritual.
ISBN :978-81-945631-7-4
20
4 Conclusion
The system designed, will help in adopting a proper strategy to evaluate the current
level of Spirituality aspect on learning features with a balanced lifestyle. On the other
hand, it will provide a qualitative base evaluating system to take a proper course of
action.
References
[1] Gallagher, Suzanne J., Tonette S. Rocco, and Hilary Landorf. "A phenomenological study
of spirituality and learning processes at work: Exploring the holistic theory of knowledge
and learning." Human Resource Development Quarterly 18, no. 4 (2007): 457-480.
[2] Tisdell, Elizabeth J. "Spirituality and adult learning." New directions for adult and contin-
uing education 2008, no. 119 (2008): 27-36.
[3] Miller, John P., SeliaKarsten, Diana Denton, Deborah Orr, and Isabella Colalillo Kates,
eds. Holistic learning and spirituality in education: Breaking new ground. SUNY Press,
2005.
[4] Buckler, Sheldon A., and Karen Anne Zien. "The spirituality of innovation: learning from
stories." Journal of Product Innovation Management: An international publication of the
product development & management association 13, no. 5 (1996): 391-405.
[5] Srivastava, Pankaj, and Neeraja Sharma. “Fuzzy Risk Assessment Information System for
Coronary Heart Disease." International Conference on Innovative Computingand commu-
nications Lecture Notes in Networks and Systems,2018,pp. 159-170,doi:10.1007/978-981-
13-2354-6 18.
[6] Srivastava, Pankaj, and Sharma, Neeraja. "A spectrum of soft computing model for medi-
cal diagnosis." Applied Mathematics & Information Sciences 8, no. 3 (2014): 1225.
[7] Srivastava, Pankaj, and Sharma, Neeraja "Soft computing criterion for ECG beat classifi-
cation and cardiac analysis." (2012).
[8] Srivastava, Pankaj, and Sharma, Neeraja and Singh, Richa. "Soft computing diagnostic
system for diabetes." International Journal of Computer Applications 47, no. 18 (2012).
[9] Srivastava, Pankaj, and Srivastava, Amit. "A note on soft computing approach for cardiac
analysis." Journal of Basic and Applied Scientific Research 2, no. 1 (2012): 376-385.
[10] Srivastava, Pankaj, and Srivastava, Amit. "Spectrum of soft computing risk assessment
scheme for hypertension." International Journal of Computer Applications 44, no. 17
(2012): 23-30.
[11] Srivastava, Pankaj, and Mondal, Rajkrishna. "Diabetes Diagnostic Intelligent Information
System." TEST engineering and management82, no.Jan/Feb (2020): 14455 – 14467.
[12] Srivastava, Pankaj and Srivastava, Saurabh “Soft Computing Market Research Analytics
on Recommendation for Tourists Destinations in Varanasi-India”, International Journal of
Advanced Science and Technology29, no.04(2020): 791-807.
ISBN :978-81-945631-7-4
21
A Spectrum of Kidney Performance Intelligent System
with reference to stone formation related issues
Pankaj Srivastava1[0000-0003-2437-4827]
Jyoti Srivastava2[0000-0003-4974-2438]
1Department of Mathematics, MNNIT Allahabad, Prayagraj-211004
drpankaj23@gmail.com
Abstract. Kidney Stone is one of the vital health concerns for millions of peo-
ple across the world and especially in India. It is a problem that can come to any
person at any age.
Now days due to pollution, smoking, eating oily, fried and spicy junk foods,
toxin levels in our blood are increasing on the one hand and on the other hand,
breathing exercises are not followed. All these have resulted in reducing the ca-
pacity of lungs. And so, the burden on kidney is increasing. Moreover, the use
of refined oil, hydrogenated oil and consumption of certain drugs also directly
damage the kidneys.
In the present days one of the elements of Soft Computing i.e. fuzzy tools
are very effective in dealing with uncertain medical thoughts and are very close
to the way human thinks. In the present paper a system has been developed to
diagnose the kidney stones at a very early stage of its development and even
suggest what the tendency of the person to develop it is. Also, it will provide
the information if the condition is critical. This study is based on patient’s water
intake, Urinary tract infection, GFR, Blood pressure and family history. This in-
ference system will be applied on the real-life data collected from various med-
ical clinics to assess the performance of the system.
1 Introduction
Due to changing life style habits and changing dietary habits, the problem like kidney
stones is becoming very common ailment. Function of kidney is to clean waste from
the blood and remove it in the urine. They control the levels of sodium, potassium and
calcium in the blood.
If the intake of liquid is not sufficient, stones are formed in the kidney [1]. Excess of
acidic food often causes kidney stones. The formation of stones in the kidney is the
ISBN :978-81-945631-7-4
22
result of defects in the general metabolism [2]. They usually occur when the urine
becomes highly concentrated due to heavy perspiration.
Stones in the kidney do not show any symptoms and can go undiagnosed. When stone
leaves the kidney, it travels to the bladder through ureter. Often the stone become
lodged in this ureter and starts blocking the flow of urine [5].
The patient of kidney stones suffers from severe pain whenever these stones pass on
to bladder. Patient also feels nausea and vomiting. Patient feels the intense need to
urinate and also caught with high fever. Due to bruises and wounds in the urinary
tract by stones, bloods are seen in the urine and sever pain causes during urination.
The severe pain usually starts from side of the body, from back it radiates towards the
abdomen or towards lower part pelvis.
The kidney stones are compound of calcium oxalate and phosphorus. Calcium content
is largest in these stones.
Every year more than half a million people are diagnosed with kidney stones. As per
National Kidney foundation the risk of kidney stones in men is about 19% and in
women it is about 9% [11]. Other diseases such as high blood pressure, diabetes, and
obesity may increase the risk for kidney stones [6,7,8].
Treatment of kidney stones depends upon the type of stone, location of stone and how
severely it is affecting the urine passage. Sometimes medication is helpful and, in
some case, operations also suggested.
This article has been organized into 5 sections. In section 2, we developed the input
risk factors and decide the output variables. Section 3 has been discussed about the
methodology. In section 4, through the real medical data we have experimented our
method and verified it with medical experts. Also, a sensitivity analysis has been
made in this section. In section 5, we make a conclusion of this study.
According to the above literature review [4,8,9,10] and through the consultation
with Doctors we have decided main five input risk factors which are directly or indi-
rectly effects the Kidney Stone formation.
1. Urine Frequency
2. Burning Sensation in Urine
3. Abdominal Pain
4. Fever
5. Water Intake
But in natural life the above taken inputs are not precise. So, though the quantitative
settings the measurement of these factors are not possible. In such scenarios qualita-
ISBN :978-81-945631-7-4
23
tive setting i.e., linguistics measurement tools are very important to remove such dif-
ficulty [3,4]. So, the above input factors have been classified in various linguistics
terms. The details have been shown in below table 1:
According to Medical Experts the output levels has been classified into 5 level the
details are given below:
1. Level 1: No Risk
2. Level 2: High risk of Kidney Stone
3. Level 3: Stone presents in the upper part of Ureter
4. Level 4: Stone presents in the lower part of Ureter
5. Level 5: Stone lodges at the Ureter Vesical Junction
3 Methodology
ISBN :978-81-945631-7-4
24
3.1 Phase 1: Build Relation Matrix
Each relation matrix has been built through the rating system where 5 is fully satis-
fied, 4 is satisfied, 3 is for moderate, 2 is unsatisfied, 1 is for fully unsatisfied.
ISBN :978-81-945631-7-4
25
Table 6. Relation Matrix (𝑅5 )Water intake vs Output Level
According to various literature survey and using the knowledge of Medical Experts
we have generated the Weighting Vectors for the input variables. As previous phase
we have taking the rating system between 1 to 5 for marking the importance of the in-
put variables. Where 5 stands for most important and 1 for less important. Input risk
factors and the corresponding importance value has been shown below:
1. Urine Frequency: 5
2. Burning Sensation in Urine: 2
3. Abdominal Pain: 5
4. Fever: 1
5. Water Intake: 4
So, the generating weighting vector is 𝑊 = [5 2 5 1 4]
Now the output variable has been computed through the following equations
After that we have calculated the indexing of the maximum value of 𝑀 which is
𝑖𝑛𝑑 = 𝐼𝑛𝑑𝑒𝑥[𝑀𝑎𝑥{𝑀}]
Now the final decisions will be taken according the value of 𝑜𝑢𝑡𝑝𝑢𝑡(𝑖𝑛𝑑)
ISBN :978-81-945631-7-4
26
The MATLAB Code and Flow diagram (in figure 1.) for the above methods has been
shown below
Phase 2
Phase 1 (Build Relation Matrix) (Generating Weighting vector )
W
R1 R2 R3 R4 R5
Phase 3 Phase 4
(Computing the Output Vector ) (Final Decision)
FINAL OUTPUT
INPUT
ISBN :978-81-945631-7-4
27
4 Experiment with Sensitivity Analysis
4.1 Experiment
From near Health Center we have collected a patient data for our five input risk fac-
tors. The details are given below
In this section we have discussed the sensitivity of the input variables. If the changes
happen in input variables then how it effects into the output variables.
ISBN :978-81-945631-7-4
28
Fig. 3. Output variables of “Burning Sensation in Urine vs Abdominal Pain” and “Ab-
dominal Pain vs Fever”
Fig. 4. Output variables of “Fever vs Water Intake” and “Urine Frequency vs Water Intake
From the figure 2, 3 and 4 it is cleared that how the output variables react when we
change the input variables.
If it makes a combination vectors of all the input variables and after that if we plot
the output variables then this picture has been shown in figure 5.
ISBN :978-81-945631-7-4
29
Fig. 5. Output variables of all kinds input variables
Our Diagnosis: As per our result the person lies in level 3 it means that the pa-
tient is having stone in the upper part of the ureter.
Doctor’s Diagnosis: As per report of patient the stone is 8.6 mm and doctor
says that when the pain appears in the patient the stone was lying in the upper part of
the ureter. After medication the pain subsided and stone was gradually removed.
Thus our diagnosis matches with that of doctor’s diagnosis and on the same line
no. of cases has been tested to check the authenticity of the system.
5 Conclusion
In this paper we have developed an algorithm to diagnose the presence and location of
kidney stone using the fuzzy model. In the current research we have collected the data
of the patients based on our input factors and result of this diagnosis have been vali-
dated with the help of expert doctors. The advantage of this research is that it can help
any person to check if he is having the risk of kidney stone or if he is suffering from
this problem in this way the present research model can act as a first line of diagnosis.
Acknowledgement
The Authors would like to extend our gratitude to Dr. Shailesh Dwivedi, M.D. (Medi-
cine) for giving us our precious time for evaluating the performance of our system
and guiding all the way with his valuable suggestions to develop this research article.
We would also like to thank Dwivedi Multispecialty Hospital for providing us with
the data of the patients without which our research would be incomplete.
ISBN :978-81-945631-7-4
30
References
1. Al-Risi, Aaisha Obaid Zayid, N. Ali, and A. Ahuja. "Study on prevalence and management
of renal stones among Omani in-patients at Sohar hospital." Sch. J. App. Med. Sci 2.1A
(2014): 22-33.
2. Levey, Andrew S., et al. "Definition and classification of chronic kidney disease: a posi-
tion statement from Kidney Disease: Improving Global Outcomes (KDIGO)." Kidney in-
ternational 67.6 (2005): 2089-2100.
3. Bellman, Richard E., and Lotfi Asker Zadeh. "Decision-making in a fuzzy environment."
Management science 17.4 (1970): B-141.
4. Begum, Shahin Ara, and O. Mema Devi. "Fuzzy algorithms for pattern recognition in med-
ical diagnosis." Assam University Journal of Science and Technology 7.2 (2011): 1-12.
5. Mahdavi-Mazdeh, Mitra. "Why do we need chronic kidney disease screening and which
way to go?." Iranian journal of kidney diseases 4.4 (2010): 275.
6. Srivastava, Pankaj, and Amit Srivastava. "A note on soft computing approach for cardiac
analysis." Journal of Basic and Applied Scientific Research 2.1 (2012): 376-385.
7. Srivastava, Pankaj, Neeraja Sharma, and Richa Singh. "Soft computing diagnostic system
for diabetes." International Journal of Computer Applications 47.18 (2012).
8. Srivastava, Pankaj, and Amit Srivastava. "Spectrum of soft computing risk assessment
scheme for hypertension." International Journal of Computer Applications 44.17 (2012):
23-30.
9. Srivastava, Pankaj, Amit Srivastava, and Ritu Sirohi. "Soft computing tools and classifica-
tion criterion for hepatitis B." International Journal of Research and Reviews in Soft & In-
telligent Computing 2.2 (2012): 147-153.
10. Srivastava, Pankaj, and Neeraja Sharma. "A spectrum of soft computing model for medical
diagnosis." Applied Mathematics & Information Sciences 8.3 (2014): 1225.
11. Goeddeke-Merickel, Catherine M. "Kidney Stone Disease: Online and Educational Re-
sources." Nutritional and Medical Management of Kidney Stones. Humana, Cham, 2019.
291-294.
12. Kidney Stones: A Patient Guide https://www.kidney.org/atoz/content/kidneystones
ISBN :978-81-945631-7-4
31
Applications of Additive Manufacturing in Orthodontics
1akash.joshi697@gmail.com
2kedar.inamdar@walchandsangli.ac.in
1 Introduction
ISBN :978-81-945631-7-4
32
Research is going on day by day in the field of the orthodontic aligner
treatment to make alternative over conventional brackets. The main aim of the
orthodontic treatment is to maintain the tooth alignment. Digital STL files are scanned
by using 3d scanners and 3d models are manufactured by using FDM technology. The
modifications can be done by using CAD software and modified files can be used to
print with the help of additive manufacturing processes.
2 Literature Review
T. Wheeler et al. [1] Work on tooth movement and, in particular, tooth movement
dynamics with aligners and variations in these movements has been studied in order to
further improve the computer algorithms used in the sequence of aligned tooth
movements.
L. Yu Chan et al. [2] suggested that in-office 3D printing would enable orthodontics
to print physical models that could be used to build alignments. Digital FDM 3D
printer prototypes will minimize costs and boost the quality of service delivery by
outsourcing. We will save extra time to print at holidays. In addition, orthodontists
can change the tooth movement settings as much as they like on digital models, as it is
not costly to create a physical model. A lot of people with orthodontics are worried
with esthetics.
K. Mahn Kim et al. [3] as well as poor presentation, oral health is impaired during
orthodontic treatment. Transparent orthodontic aligners (TOAs) are introduced as an
alternative to fixed brackets and wires to tackle this problem. TOAs can be quickly
added and removed and do not impair a person's ability to chew. These are most
widely used in adult orthodontic care.
C. Groth et al. [4] Studied that 3D printing is still widespread in orthodontic practice,
we expect it to follow a path close to that of intraoral electronic scanners. By using a
3D printer, the orthodontist will achieve a fully digital workflow. The removal of
conventional impressions and stone models not only reduces clutter and storage
requirements in the hospital but also improves functional performance, improves the
health of appliances, facilitates model reuse, leads to happier patients and personnel.
Tarika M A Kohil [5] Studied all processes of 3D printing related to dentistry and
advantage of processes are to be studied in this paper. The future scope is explained
well. The improvements in technology should be carried out for the tooth alignment
and positioning.
ISBN :978-81-945631-7-4
33
This process reduces cost and gives better service to the patients. Figure1 shows the
real printing of model on 3Dprinter.
ISBN :978-81-945631-7-4
34
3.3 Advantages of 3DPrinting
• Customization– Any type of complex material can be printed.
• Constant Prototyping and Improved Productivity– Both large- and small-
scale models can be easily get printed.
• Affordability– The initial cost is high compared with traditional one but
labor and material cost is low in 3Dprinting.
• Time saving-Manufacturing 3D models the time required is less compared to
traditional methods.
• Accuracy- It is the main output of the 3d printing process in dentistry.
• Complexity- The possibility of printing complex geometries can be easily
done and the assembly of parts is not required.
• Less material is required and waste material can be re used.
• Production of single objects, smaller quantities at low cost is possible and de-
livery is becoming very fast.
3.4 Disadvantages
• Small size–Some printer shave small size but in the future, we would
fabricate the large size printer.
• Small raw materials
• High cost of investment.
• Lot of skills are required.
• Further post process is required.
3.5 Applications
• Mass customization- Companies have developed platforms where users can use
streamlined web-based configuration tools to customize objects and order the
resulting objects as unique 3Dprinted objects.
• Food industry- Additive food processing is produced by pressing food into
three-dimensional objects, layer by layer. Suitable candidates include a wide
range of foods, such as chocolate and chips, and flat foods such as crackers,
pasta and pizza.
• Bioprinting-3D printing is known to be a method for the implantation of
stem cells capable of producing new tissues and organs in living humans.
Stem cells make an enormous promise in 3D bio printing that they can
convert into every other kind of cell in the human body.
ISBN :978-81-945631-7-4
35
• Dentistry-3Dmodelsarepreparedbyusingtheprinteranddigitalmodelscan be
changed with respect to the required shape and size.
• Aerospace industry- To check the aerodynamic capacity of planes, the 3d
models are prepared and tested in the labs.
• Space – Small 3d models for educational purposes are to be manufactured by
using the additive manufacturing process.
4 Orthodontics
ISBN :978-81-945631-7-4
36
4.1 Steps of Aligner Manufacturing by using the rmo forming Process.
• Aligners are the 3d shaped transparent bracket which is used to move teeth to
the predefined position.
• It is transparent and easy to use for patients.
• Instead of using the traditional brackets, then ew technology has introduced
in the field of dentistry.
• PETG and copy plast materials are used to manufacture clear aligners.
• First, the 3d scanning of the patient is done then the modification has made in
the digital file.
• The digital file is converted in STL format and Gcodes are to be generated by
using CURA software.
• G code file is used to form the 3d model.
• 3d models are manufactured by using FDM 3d printer.
• Circular sheet of PETG material is heated and thermoforming process is
carried out by using Bio-star thermoforming machine. Figure 3 shows the
thermoformed clear aligners.
• The post-process is carried out on a clear aligner.
ISBN :978-81-945631-7-4
37
Fig. 4 Traditional Orthodontics (3D Fig.5 Digital Orthodontics (3D Models
Models Made by Clay Material). Made by PLA Material).
6 Conclusion
Digital orthodontics plays a vital role in the orthodontic market. The quality
improvement appearance, aesthetics are the major advantages of this process. The
fused deposition modeling is the process of 3d printing which is less expensive, easy
to use. Material cost is lower and it has greater efficiency. It requires less time; no
chemical and physical post-processes are required. CAD-CAM software and 3D
printing is the best engineering tool which has more applications in the dentistry. The
initial cost is high and the training is required for production. The transparent aligner
has gained the instant appeal to patients so, the treatment of clear aligner is popular
than traditional methods of orthodontics. Research in the improvement of technology
is going on so, the scope of orthodontics will be more in the future.
7 Acknowledgement
References
1. T.Wheeler,“ Orthodontic clear aligner treatment”, Orthodontic clear aligner treatment,
Seminars in Orthodontics, 2016.
2. L. Chan, C. Chen Jane Yao and Y. Jane Chen, “Clear Aligner Treatment with In-Office
Virtual Model Set-Up and 3D Printing”, Journal of Dentistry and Oral Care, 21-25,2017.
3. K. Mahn Kim, “Effects of therm of ormingon the physical and mechanical properties of
thermoplastic materials for transparent orthodontic aligners”, Korean Journal of
Orthodontics, 317-325,2018.
ISBN :978-81-945631-7-4
38
4. C. Groth, N. Kravitz, P. Jones and J. Graham, “Three-Dimensional Printing Technology”
48, 475-485,2014.
5. T. Kohil, “3D Printing in Dentistry” ACTA Scientific Dental Sciences, 35-41,2019.
6. J. Stansbury and M. Idacavage, “3D printing with polymers: Challenges among expanding
options and opportunities” Dental Materials 32, 54-64,2016.
7. E.Taneva, B. Kusnotoand C.Evans,“3D Scanning, Imaging, and Printing in Orthodontics”
149-187,2016.
8. Aligner, www.youtube.com, https://www.youtube.com/watch?v=kAQJB6vhzz0, August
21,2019.
9. S. Mahamood, M. Kader and H. Ali, “Applications of 3D Printing in Orthodontics: A Re-
view” 267-270,2016.
10. K. Lee, J. Cho, N. Chang, J. Chae, K. Kang, S.Kim and J. Cho, “Accuracy of three
dimensional printing for manufacturing replica teeth” Korean Journal of Orthodontics,217-
225, 2015.
ISBN :978-81-945631-7-4
39
Investigating Behavior of Functionally Graded Sandwich
Plates - A Review
venushree.khanke@walchandsangli.ac.in,
hod.apm@walchandsangli.ac.in
Abstract. The modern materials in the composites family are the Functionally
Graded Materials (FGMs). Some natural FGMs are wood, human skin and
bones,bamboo, etc. Functionally Graded Materials havevivid applications in
engineering structures, aircraft and spacecraft, navy and medical fields by virtue
of its great advantages. Metal/Ceramic FGM composites are mostly used in
which the ceramic layer offers better heatresistance whereas metal layer offers
great fracture toughness. Uniform and gradient variation in the materialcharac-
teristics aid in reducing the stresses at the interface and delamination ofstruc-
tures. The capability to tailor the properties of advanced composites - Function-
ally Graded Materials as per the problem demand is the reason behind the sig-
nificant attention of theresearch community. Now-a-days, Functionally Graded
sandwich plates and beams are widely used in many applications. Therefore,
this study deals with the review of the methods proposed by various research
experts for evaluating theperformance of sandwich plates made of FGM. Dif-
ferent methods and theories of plate namelyCPT,FOSDT, HOSDT, Layer wise
Theory and Zigzag Theory along with their merits and demerits are put forth in
this study.
1 Introduction
The modern engineered composites are the Functionally Graded Materials (FGMs).
Some natural Functionally Graded Materialsare wood, human skin and
bones,bamboo,etc. [1]. Firstly, FGMs were manufactured in Japan during 1980s tak-
ing into consideration the enormous benefits of these materials[2]. The prevalent ones
are Metal-Ceramic FGMs in which excellent fracture toughness is exhibited by metal
and great thermal resistance is exhibited by ceramics. These FGMs enhance the
characteristics of thermal barrier structures due to the smooth transition between the
characteristics of the parts, ultimately preventing cracking or delamination[3].
The stresses at interface and delamination of structure can be removed with uni-
form and gradient alterations in the material characteristics of functionally graded
material builtstructures. Metal-ceramic FGM's interface results in few deformation of
ISBN :978-81-945631-7-4
40
elevated temperature gradient in some instances. For instance, a nuclear reactor in
which there is continuous fission reactions. Common structures made of functionally
graded materialsare made of ceramic and metal layers called as sandwich functionally
graded plates. These plates consist of face sheets of uniform material andcentral core
of functionally graded material. These laminates are useful in prevention of distor-
tions and failure. The ability to adapt according to the operating conditions is the main
point of focus in Functionally Graded Materials (FGMs) which ultimately aids in
design and manufacturing of these materials depending on the functional require-
ments[4].
The research community's recent focus on composites and functionally graded
sandwich plates is solely due to their capacity to design the characteristics according
to the requirements of the problem. Different techniques and theories of plate pro-
posed by many researchers are discussed here for analyzing functionally graded
sandwich plates.
2 Literature Survey
Various theories of composite plates namely Classical Plate Theory (CPT), First Or-
der Shear Deformation Theory (FOSDT), Higher Order Shear Deformation Theory
(HOSDT) and Layer Wise Theory (LWT) etc. are presented by multiple researchers
toevaluate the performance of Functionally Graded plates.
ISBN :978-81-945631-7-4
41
2.1 Classical Plate Theory (CPT)
CPT is so called Kirchhoff’s Plate Theory. The basic presumption made is that the
plate thickness remains same during bending as there are zero transverse shear
strains[5]. The normal stress is considered as null in the direction of thickness which
converts 3D problem into a 2D one. The Fig.1.clearly explains the concept of Classi-
cal Plate Theory. Yang &Shen[6]studied non-uniform performance of functionally
graded plates by semi-analytical approach. Loads were applied in transverse and in-
plane directions on the plates to study large deflection as well as post buckling re-
sponse. The displacement field is given by:
𝜕𝑤
𝑢(𝑥, 𝑦, 𝑧, 𝑡) = 𝑢0 (𝑥, 𝑦, 𝑡) − 𝑧
𝜕𝑥
𝜕𝑤
𝑣(𝑥, 𝑦, 𝑧, 𝑡) = 𝑣0 (𝑥, 𝑦, 𝑡) − 𝑧
𝜕𝑦
𝑤(𝑥, 𝑦, 𝑧, 𝑡) = 𝑤0 (𝑥, 𝑦, 𝑡)(1)
where𝑢0 , 𝑣0 𝑎𝑛𝑑𝑤0 are the central plane displacements along the correspondingX, Y
and Zco-ordinate system.Malekzadeh&Beni[7] has applied CPT for analyzing FG
plates made of non-homogeneous materials. Different boundary conditions were ap-
plied to the plates for studying nonlinear free vibrations. Alinia&Ghanadpour[8] has
used CPT for the non-uniform performance of square FG plates loaded with pressure.
Deflections and stresses were found by minimizing the potential energy.But the main
drawback of this theory is that it is applicable for thin plates only and not suitable for
composite plates.
FOSDT is also called as Timoshenko Beam Theory. The main presumption ofFOSDT
is that shear strain in transverse direction remains constant throughout the plate thick-
ness. This leads to requirement of shear correction factor for appropriate deformed
strain energy representation. The Fig.1. clearly explains the abstract idea of First Or-
der Shear Deformation Theory. Belalia&Houmat[9] proposed Mindlin’s FOSDT for
the study and developed new concept of finite element method by using a curved p-
element of triangular shape. Threedifferent forms of sector plates consisting function-
ally graded materials (Stainless Steel/Silicon Nitride, Aluminium/Aluminium Oxide,
Aluminium/Zirconium Oxide) were used for nonlinear free vibrations. The in-plane
displacements (u0,v0) and out-plane displacement (w0) were expressed as:
ISBN :978-81-945631-7-4
42
lar direction about the Xaxis axes.Kiani, et al.[10] used FOSDT for performance of
sandwich plates made of FGtop and bottom face sheets subjected to Pasternak elastic
foundation. This study focused on its thermal and mechanical buckling behavior.
Vimal, et al.[11]proposed FOSDT on moderately thick FG plates to study the shear
deformation effects in transverse direction and rotary inertia. Yin, et al. [12] applied
isogeometric analysis approach for analyzing functionally graded plates with geomet-
ric imperfections. FOSDT considering the presumptions given by von-Karman was
put forth by Wu &Kitipornchai[13]to obtain the non-uniform vibration behavior of
geometrically imperfect functionally graded composite beams reinforced with carbon
nanotubes. However, this theory is not applicable for thick plates and there arises a
need for shear correction factor which led to further research and evolution of-
HOSDT.
As there are shortcomings in CPT and FOSDT, Higher Order or Refined ShearDe-
formation Theories were developed. The in plane displacement fields consists of
higher order polynomials which are function of thickness co-ordinate. This eliminates
the requirement of factor of shear correction unlike in FOSDT[14]. The Fig.1.clearly
explains the concept of HOSDT. Yang, et al.[15]proposed HOSDT to find out the
post buckling performance of geometrically imperfect FG plates. 1-D quadrature
semi-analytical method was applied to determine the dominating differential equa-
tions. Talha& Singh [16]studied the steady state and free vibrationalperformance of
functionally graded plates. The above and base face sheets in the plate were subjected
to traction free boundary conditions. Jagtap, et al.[17]proposed a HOSDT comprised
of non-uniform strains proposed by von Karman and C0 continuity with some modifi-
cations. Probabilistic non-uniform free vibration behavior of FGplateresting on elastic
supports and subjected to randomness of thermal system was studied. Gupta
&Talha[18] presented a new higher order shear and normal deformation theory con-
sidering non-polynomial displacement function which investigated the vibrational
performance of FGM plates with geometric non linearity. Tomar&Talha[19] proposed
Reddy’s HOSDT for studying the static bending and vibrationalperformance of FGM
skew sandwich plates under thermal conditions. The displacement field as per Red-
dy’s HOSDT was assumed as:
𝑢 𝑢0 ∅𝑥 𝜓𝑥 𝜉𝑥
{ 𝑣 } = { 𝑣0 } + 𝑧 {∅𝑦 } + 𝑧 2 {𝜓𝑦 } + 𝑧 3 {𝜉𝑦 }(3)
𝑤 𝑤0 0 0 0
where u, v, andw are the translational deflections at a point in in-plane and transverse
directions, u0,v0,w0 are central plane displacements. ∅𝑦 refers to transverse normal
rotation to the central plane about Y axis and ∅𝑥 refers to transverse normal rotation to
the central plane about X axis, 𝜓𝑥 , 𝜓𝑦 , 𝜉𝑥 , 𝜉𝑦 are terms of higher order in Taylor’s
series expansion. This theory does not represent the exact behavior of the laminated
composite plates as there exist discontinuity of strains at layer interfaces.
ISBN :978-81-945631-7-4
43
2.4 Layer-Wise Theory (LWT)
There is discontinuity in transverse strains at the boundary of the layers which is not
addressed by CPT, FOSDT or HOSDT, so Layer-wise Theories were devel-
oped.Layer-wise Theory considers displacement field, Stress and Strain fields at each
layer interface throughout the thickness. This results in continuous transverse stress at
the interfaces which helps in accurate analysis. Yas, et al. [20]analyzed FGM hollow
cylindershaving piezoelectric ring by using Layer-wise theory. Virtual Work concept
wasappliedalong with the incorporation of discontinuities in the formulation at
the interface for obtaining governingdifferential equations. Pan-
dey&Pradyumna[21]studied the performance of sandwich plates made up of FGMs
by a higher order Layer wise theory. It was presumed that the core displacement field
is of higher order and upper and lowerface sheets displacement fields of first order
which ensures continuity in layer interface displacements. The central plane dis-
placements 𝑢(𝑖𝑖) ,𝑣 (𝑖𝑖) and 𝑤 (𝑖𝑖) along X, Y and Z directionsrespectively, given in thick-
ness coordinate 𝑧 (𝑖𝑖) form by Taylor's expansion are as follows:
2 3
𝐿1 = (𝑧 (𝑖𝑖) ) 𝑢∗ + (𝑧 (𝑖𝑖) ) 𝜃𝑥 ∗
2 3
𝐿2 = (𝑧 (𝑖𝑖) ) 𝑣 ∗ + (𝑧 (𝑖𝑖) ) 𝜃𝑦 ∗ (5)
𝑢∗ , 𝑣 ∗ , 𝜃𝑥 ∗ and 𝜃𝑦 ∗ are terms of higher order in Taylor's expansion series which indi-
cates deformation modes in the cross section of the mid layer in transverse direction.
Even though LWT helps in accurate analysis; a great computational effort is required
as the layers in the laminated plate go on increasing.
ISBN :978-81-945631-7-4
44
are Zig- Zag functions. Carrera [22]published a review paper on application of zigzag
function developments. Brischetto, et al.[23]has used Zig-Zagfunction proposed by
Murakami for studying bending response of sandwich plates. Neves, et al.
[24]proposed hyperbolic theory for to evaluate theperformance of sandwich plates of
FGM. This theory takes into account various effects such as zigzag and warping.
More research is required to develop Zig-Zag theory for accurate results.
ISBN :978-81-945631-7-4
45
directiondiffer in a piece-wise pat- ity of the transverse displacement.
tern throughout the thickness of plate.
ii. The analysis is highly efficient.
3 Concluding remarks
The above study of literature reveals that extensive research work is performed by
multiple researchers for attaining the desired performance of Functionally Graded
Plates. Differenttheoriesofplates such as CPT, FOSDT, HOSDT, LWT, ZZT
and various methods were applied to assess the flexural and vibrational performance
of functionally graded plates. The researchers have used FOSDT and HOSDT exten-
sively for the analysis, however there are some demerits associated with them as they
are two dimensional analogous single layer theories. It is observed that the advanced
Layer wise and Zig-Zag plate theories are advantageous so as to understand the actual
performance of such plates with good computational accuracy. Therefore, further
research is required to improve the LWT and ZZT for obtaining the static flexure and
vibrational performance of FG sandwich plates. The improvement in LWT and ZZT
will be carried out for the desired performance of FG plates.
References
1. D. K. Jha, T. Kant, and R. K. Singh, “A critical review of recent research on
functionally graded plates,” Compos. Struct., vol. 96, pp. 833–849, (2013).
2. M. Koizumi, “FGM activities in Japan,” Compos. Part B Eng., vol. 28, no. 1–2, pp. 1–
4, (1997).
3. S. S. Wang, “Fracture Mechanics for Delamination Problems in Composite Materials,”
J. Compos. Mater., vol. 17, no. 3, pp. 210–223, (1983).
4. B. Abdenbi, E. B. Khalid, and B. Rhali, “Geometrically Non-Linear Free Vibration
Analysis of Functionally Graded Rectangular Plates,” vol. 7, no. 11, pp. 1242–1246,
(2013).
5. A. Gupta and M. Talha, “Recent development in modeling and analysis of functionally
graded materials and structures,” Prog. Aerosp. Sci., vol. 79, pp. 1–14, (2015).
6. J. Yanga and H. S. Shen, “Non-linear analysis of functionally graded plates under
transverse and in-plane loads,” Int. J. Non. Linear. Mech., vol. 38, no. 4, pp. 467–482,
(2003).
7. P. Malekzadeh and A. Alibeygi Beni, “Nonlinear free vibration of in-plane
functionally graded rectangular plates,” Mech. Adv. Mater. Struct., vol. 22, no. 8, pp.
633–640, (2015).
8. M. M. Alinia and S. A. M. Ghannadpour, “Nonlinear analysis of pressure loaded FGM
plates,” Compos. Struct., vol. 88, no. 3, pp. 354–359, (2009).
9. S. A. Belalia and A. Houmat, “Nonlinear free vibration of functionally graded shear
deformable sector plates by a curved triangular p-element,” Eur. J. Mech. A/Solids,
vol. 35, pp. 1–9, (2012).
10. Y. Kiani, E. Bagherizadeh, and M. R. Eslami, “Thermal and mechanical buckling of
ISBN :978-81-945631-7-4
46
sandwich plates with FGM face sheets resting on the Pasternak elastic foundation,”
Proc. Inst. Mech. Eng. Part C J. Mech. Eng. Sci., vol. 226, no. 1, pp. 32–41, (2012).
11. J. Vimal, R. K. Srivastava, A. D. Bhatt, and A. K. Sharma, “Free vibration analysis of
moderately thick functionally graded skew plates,” Eng. Solid Mech., vol. 2, no. 3, pp.
229–238, (2014).
12. S. Yin, T. Yu, T. Q. Bui, and M. N. Nguyen, “Geometrically nonlinear analysis of
functionally graded plates using isogeometric analysis,” Eng. Comput. (Swansea,
Wales), vol. 32, no. 2, pp. 519–558, (2015).
13. H. L. Wu, J. Yang, and S. Kitipornchai, “Nonlinear vibration of functionally graded
carbon nanotube-reinforced composite beams with geometric imperfections,” Compos.
Part B Eng., vol. 90, pp. 86–96, (2016).
14. S. Parida and S. C. Mohanty, “Vibration and Stability Analysis of Functionally Graded
Skew Plate Using Higher Order Shear Deformation Theory,” Int. J. Appl. Comput.
Math., vol. 4, no. 1, pp. 1–22, (2018).
15. J. Yang, K. M. Liew, and S. Kitipornchai, “Imperfection sensitivity of the post-
buckling behavior of higher-order shear deformable functionally graded plates,” Int. J.
Solids Struct., vol. 43, no. 17, pp. 5247–5266, (2006).
16. M. Talha and B. N. Singh, “Static response and free vibration analysis of FGM plates
using higher order shear deformation theory,” Appl. Math. Model., vol. 34, no. 12, pp.
3991–4011, (2010).
17. K. R. Jagtap, A. Lal, and B. N. Singh, “Stochastic nonlinear free vibration analysis of
elastically supported functionally graded materials plate with system randomness in
thermal environment,” Compos. Struct., vol. 93, no. 12, pp. 3185–3199, (2011).
18. A. Gupta and M. Talha, “An assessment of a non-polynomial based higher order shear
and normal deformation theory for vibration response of gradient plates with initial
geometric imperfections,” Compos. Part B Eng., vol. 107, pp. 141–161, (2016).
19. S. S. Tomar and M. Talha, “On the flexural and vibration behavior of imperfection
sensitive higher order functionally graded material skew sandwich plates in thermal
environment,” Proc. Inst. Mech. Eng. Part C J. Mech. Eng. Sci., vol. 233, no. 4, pp.
1271–1288, (2019).
20. M. H. Yas, M. Shakeri, and M. Khanjani, “Layer-wise finite-element analysis of a
functionally graded hollow thick cylinder with a piezoelectric ring,” Proc. Inst. Mech.
Eng. Part C J. Mech. Eng. Sci., vol. 225, no. 5, pp. 1045–1060, (2011).
21. S. Pandey and S. Pradyumna, “Analysis of functionally graded sandwich plates using a
higher-order layerwise theory,” Compos. Part B Eng., vol. 153, no. August, pp. 325–
336, (2018).
22. E. Carrera, “Historical review of Zig-Zag theories for multilayered plates and shells,”
Appl. Mech. Rev., vol. 56, no. 3, pp. 287–308, (2003).
23. S. Brischetto, E. Carrera, and L. Demasi, “Improved bending analysis of sandwich
plates using a zig-zag function,” Compos. Struct., vol. 89, no. 3, pp. 408–415, (2009).
24. A. M. A. Neves, D. De Engenharia, F. De Engenharia, U. Porto, and R. R. Frias,
“Analysis of functionally graded structures by radial basis functions using several
theories under Carrera ’ s Unified Formulation,” vol. 19, p. 10129, (2006).
ISBN :978-81-945631-7-4
47
CH Selection in WSN using Digital Image Processing
lncs@springer.com
1 Introduction
The primary application is to monitor the distant locations then gather the information
concerning surprising phenomenon such as Fire in Forest, Volcano eruption & Enemy
association. Utilizing ARQ to handle mistaken parcels in such condition is wasteful,
as a result of more re-transmissions are required. WSNs contain spatially isolated self-
governing Sensing Devices to observe physical or natural conditions such as Thermal,
Acoustic and Strain etc. and to considerately send the information throughout ar-
rangement toward the Base Station. Military Survey was completed to see how the
hardware and the innovations can be applied to serve the military needs. The Survey
verified that WSN's can be successfully utilized in the military borders to monitor any
movement crosswise over it. Various necessities of Armed Surveillance structure
ISBN :978-81-945631-7-4
48
were considered. Because of the arbitrary distribution of Hubs from the air vehicle,
the Hubs get scattered; for example more Hubs will fall in one region while less Hubs
in various other area. The density of Hubs won't be same all through. Consequently,
hundred percentage coverage of the territory may be impossible [9].
Fig.2. Wireless Sensor Networks (a) JNKVV, (b) Water Treatment Plant Jabalpur [15]
ISBN :978-81-945631-7-4
49
iv. Mechanical Sensors
v. Bio Sensors
Life time is characterized by the time between First Hub Death (FND) and Last Hub
Death (LND). Life Time is the key feature meant for evaluate system in an function
specific manner [4].
2.2 Dissipation
Energy Dissipation implies the absolute Energy dissipated in System to carry out
communication, collection & accumulation [4].
3 Literature Work
Md. Saiful Islam Rubel et al [3, 2018] Clustering is the procedure to facilitate ex-
tremely well towards attains level up as well as energy reduction. They planned Clus-
tering method so as to able to handle crucial & delay perceptive purpose. [3].
Let,
CS= Total number of Critical Sensor
If CS > 0 then it means there are some Critical Sensors. Now these Sensors cannot be
present elected CH.
In the rest of the Hubs, the Hub having minimum energy level is selected as CH.
The network size or simulation area was kept 100m * 100m with taking 100 Hubs.
Initial energy level 0.15 Joule and the packet size 400 Byte has been taken. Simula-
tion has been done in MATLAB. The proposed protocol is (Distance Based Energy
Aware) DBEA-LEACH. The Transmission / Receiving Energy are 50 Joule. Hub is
ISBN :978-81-945631-7-4
50
selected as CH if its distance from Sink is nearly equal to the average distance of the
network Hubs from Sink as well as that Hub has high Residual Energy. The result of
the method id improved Life Time [3].
Gajendran Malshetty and Basavaraj Mathapati et al [1, 2019] These Systems made
by many Sensing Hubs. This type of Sensing Hub gathers information. With the pur-
pose of accumulate huge quantity of information, Cloud Services are also used. This
assists to store information. Load Based Self-Organized (LBSO) is used for balancing
the Hub. There are 3 stages:
CH Selection.
First find out the Trigger Hub. Then calculate the Cluster Radius. The Hub having
highest Load (Weight) is selected as CH.
Cluster Formation.
Now Cluster size has to be defined. Hubs send the request for cluster formation, and
then size of the cluster be match up with the Threshold size. Accordingly, Clusters
will be formed. Each of the members obeys CI Table, which contains the following
information:
i. Cluster Head Hub (CHN) - ID
ii. Sensor Hub (SND) - ID
CH Re-selection.
Reselection process is repeated now. CH holds the Consignment of each of the mem-
ber Hubs; highest is selected as next CH. It means Hub having highest Consignment
is selected as CH [1].
4 Proposed Work
First Objects are stored in the form X-Y Coordinates as .txt file. Identify the total
number of Objects. Scan again after every 30 or 60 seconds. Store in the form X-Y
Coordinates of Objects again as .txt file. Now compare both the files.
ISBN :978-81-945631-7-4
51
Fig.3. Test Image-1 captured by Thermal Sensor of a Hub.
Case I
Both the files have similar data. It means all the Objects are stationary. There is no
any Object is suspected. Thermal Cameras send the lower spaced data means lower
Packet data by applying Steganography to enhance the security [10].
ISBN :978-81-945631-7-4
52
2X 5.211828e+02 5.211828e+02 5.211828e+02
2Y 2.107138e+02 2.107138e+02 2.107138e+02
3X 7.998132e+02 7.998132e+02 7.998132e+02
3Y 2.252407e+02 2.252407e+02 2.252407e+02
Case II
Both the files have dissimilar data. It means any of the Objects is movable. There may
be an Object suspected. In this situation, Thermal Camera turns ON the Alarm or
Image Camera. Now this Hub sends the larger Image data means larger Packet data.
ISBN :978-81-945631-7-4
53
Fig.6. Extraction of X-Y Coordinates from Test Image-2 using MATLAB.
Moment while earliest Hub is dead and that’s why failure in the coverage takes place
is LT [4, 7].
Let,
𝐸0 = opening energy = 10 J [14]
𝐸[𝐸𝑤 ] = Expected-wasted-energy
(unused energy of network after the death of Hub)
= 10% of 𝐸0 = 1 J [12, pn-63]
𝐸[𝐸𝑟 ] = Expected Reporting Energy of the network consumed
by each of the sensors [13]
= 150 mW for Image Sensor
= 0.5 mW – 5 mW for Temperature Sensor
Note- 1 Joule/Sec = 1 Watt
Now the average Life Time is given by [11]:
E [L] = S.𝐸0 – E[Ew] ……………………………………… (1)
E[Er]
ISBN :978-81-945631-7-4
54
The simulation has been executed in many Hubs ( 25 to 225 ) to verify the energy
Dissipation is reduced with respect to the size [7 pp.161].
ISBN :978-81-945631-7-4
55
If S = quantity of the Sensing Hub = 100
E[L] = 100. 10J – 1J
0.5 mJ/Sec
E[L] = 1980000 Sec ……………………………………… (9)
If any of the Hubs detects the doubtful object, then the processor send the infor-
mation to the CH. Only in this case the Images are transmitted while all other Hubs
are sending Thermal Image data. All the Image cameras are in idle mode. It means
Hubs send a little amount of information to the network. Therefore the Congestion
problem is reduced. It prohibited the time delay in the transmission of the data and
helps to increase the Life Time.
ISBN :978-81-945631-7-4
56
5 Conclusions
The downsides of LEACH could be described into three fundamental issues. The
main issue manages the incorrect decision of the CH. The 2nd issue incited by the
load unbalancing of sensor hubs in each of the clusters. Dissipation of the sensing
hubs in small size Cluster is greater compared with the bigger size Cluster. Since hubs
of small size Cluster send the majority of information. 3rd issue have formalized in
steady state stage. The entire hubs are persistently transferred. The transfer is carrying
out regardless of whether update is nothing for detected information. It address to the
purpose behind dropping inefficient energy Dissipation. This dropping causes de-
crease of the LT [4]. In this paper, we have surveyed the existing algorithms present-
ed in the literature. We have proposed a new algorithm that aims towards minimizing
Power Dissipation, and provide the better CH selection method.
Gajendran Malshetty and Basavaraj Mathapati et al find out the Residual Energy of
all the Hubs. They also say that the Hub having highest Load (Weight) is selected as
CH [1]. The result will be early death Hubs. It provides less life time, so that power
failure may be happened. On the other hand the proposed methodology says that the
Hub having highest Load (Weight) should not be selected as CH. It is not a right
choice. The proposed method provides the following 2 conclusions:
i. Case I provides less time delay due to lower data size in the form of X-Y Coor-
dinates.
ii. Case II provides highest Load (Weight). Therefore it is not a right choice to se-
lect this Hub as CH, because it increases the risk of early death Hubs. The other
Hubs which has greater Residual Energy and has a lower Load (Weight) should
be selected as CH.
References
1. Gajendran Malshetty and Basavaraj Mathapati: Efficient clustering in WSN-Cloud us-
ing LBSO (Load Based Self-Organized) technique. Third International Conference on
Trends in Electronics and Informatics (ICOEI 2019).
2. Maurizka Ainur Rahmadhani, Leanna Vidya Yovita and Ratna Mayasari: Energy Con-
sumption and Packet Loss Analysis of LEACH Routing Protocol on WSN over DTN.
IEEE (2018).
3. Md. Saiful Islam Rubel, Nahi Kandil and Nadir Hakem: Priority Management with
Clustering Approach in Wireless Sensor Network (WSN). IEEE (2018).
4. Mohamed Elshrkawey, Samiha M. Elsherif and M. Elsayed Wahed: An Enhancement
Approach for Reducing the Energy Consumption in Wireless Sensor Networks. Journal
of King Saud University – Computer and Information Sciences (2017).
5. Tri Gia Nguyen, Chakchai So-In and Nhu Gia Nguyen: Two Energy-Efficient Cluster
Head Selection Techniques Based on Distance for Wireless Sensor Networks. Interna-
tional Computer Science and Engineering Conference (ICSEC) - (2014).
ISBN :978-81-945631-7-4
57
6. Sachin Gajjar, Mohanchur Sarkar and Kankar Dasgupta: Self Organized Flexible, La-
tency and Energy Efficient Protocol for Wireless Sensor Networks. International Jour-
nals Wireless Info Networks (2014).
7. Kamil Samara and Hossein Hosseini: A Routing Protocol for Wireless Sensor Net-
works with Load Balancing. IEEE pp. 156-161 (2016).
8. Haidar Safa: A novel localization algorithm for large scale wireless sensor networks.
Computer Communications pp. 32–46 (2014).
9. Chaitanya Vijaykumar Mahamuni: A Military Surveillance System based on Wireless
Sensor Networks with Extended Coverage Life. IEEE (2016).
10. Anil K. Jain and Umut Uludag: Hiding Fingerprint Minutiae in Images: Computer Sci-
ence & Engineering Department. IEEE Transaction on Pattern Analysis and Machine
Intelligence, Vol. 25, No. 11 (2003).
11. Yunxia Chen and Qing Zhao: On the Lifetime of Wireless Sensor Networks. IEEE
Communications Letters, Vol. 9, No. 11 (2005).
12. Daniel Kifetew Shenkutie & Prashanth Kumar Patil Shinde: Residual Energy Monitor-
ing in Wireless Sensor Networks. Technical report, IDE1152 (2011).
13. Vibhav Kumar Sachan, Syed Akhtar Imam and M. T. Beg: Energy-efficient Communi-
cation Methods in Wireless Sensor Networks, A Critical Review. International Journal
of Computer Applications (0975 – 8887) Vol. 39– No.17 (2012).
14. https://www.sciencedirect.com/topics/computer-science/initial-energy.
15. http://jscljabalpur.org/wp-content/uploads/2019/06/vlcsnap-2019-05-25-
14h25m44s073.png
ISBN :978-81-945631-7-4
58
Sybil Attack in Vehicular Ad hoc Network (VANET) – A
Survey
nishtha16@yahoo.com, soodm_67@yahoo.com
2Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, India
amol.vasudeva@juit.ac.in
1 Introduction
ISBN: 978-81-945631-7-4
59
standards for various wireless ad hoc networks such as IEEE 802.11a, IEEE 802.11b
(Wi Fi), IEEE 802.11g [1], [2], [3].
One of the prominent modifications of IEEE 802.11 technology is 802.11p
specifically designed for inter vehicular communication (IVC) [3], [4]. IEEE 1609.4
specifies standards for operation across multiple channels [3]. The combination of
these two technologies is Wireless Access in Vehicular Environments (WAVE) [3].
These standards stipulate a wireless ad hoc network where nodes are vehicles, and this
kind of network is exclusively termed as Vehicular Ad hoc Network (VANET) [2].
Whenever vehicles come in the transmission range of one other, these vehicles
automatically form a network using radio signals for information exchange. The
communication among vehicles is achievable because every vehicle taking part in the
VANET has inbuilt intelligent units known as On Board Units (OBUs). These OBUs
have processors, sensors, Global Positioning System (GPS) unit, memory, and radio
interfaces for forming connections with other vehicles. These vehicles are rich in
resources and may perform high computations, and have high sensing power [2], [3].
Communication among vehicles is carried out using radio signals within their
specified range. Whenever a vehicle requires communication with other vehicles that
are falling outside its radio range, the message is delivered in a multi hop manner. In
multi hop approach, the packet is forwarded to intermediate vehicles using carry
forward approach till the packet reaches the intended destination [2], [3].
To provide secure and comfortable driving is the prime reason behind VANET [2].
Several applications exclusive for this domain are being emerged. Varied VANET
applications include traffic related information, roadside service information, relevant
local information, mobile commerce, and entertainment services [2]. The foremost
requirement of these applications is the timely delivery of the information. Besides,
these applications require reliable, exact information delivery with Quality of Service
(QoS) [2], [3].
Dissimilar from other categories of wireless ad hoc networks, VANETs may be
deployed using any of these: (i) Infrastructure based/Vehicle to Infrastructure (V2I)
communication/Pure Cellular/WLAN architecture (ii) Infrastructureless/Vehicle to
Vehicle (V2V) communication/Pure Ad hoc architecture (iii) Hybrid architecture. In
Infrastructure based/Vehicle to Infrastructure (V2I) communication/Pure
Cellular/WLAN architecture, there always exist predefined infrastructure such as
Road Side Units (RSUs) positioned at a uniform distance throughout the road. These
predefined infrastructures behave in a similar manner, such as the Access Points
(APs), where each RSU manages the network in its range. In this architecture, the
communication is centralized and takes place between the vehicle and the fixed
infrastructure. This mode of communication among vehicles to infrastructure is
known as Vehicle to Infrastructure (V2I) communication [3], [4]. Infrastructure
less/Vehicle to Vehicle (V2V) communication/Pure Ad hoc architecture of VANET
takes place without any centralized infrastructure, and vehicles communicate in peer
to peer manner using carry forwarding strategy with one another. In this peculiar
architecture, without the existence of fixed infrastructure, vehicles communicate
directly by forming interconnections with one other, known as Vehicle to Vehicle
ISBN: 978-81-945631-7-4
60
(V2V) communication mode in VANET [4]. Both the V2V and V2I communications
are carried out in the hybrid architecture of VANET [4].
Vehicles in VANET move at a very high speed and these vehicles frequently enter
or leave the network. This makes VANET a highly dynamic network. Vehicles
participating in VANET are also of different make and model. Moreover, vehicle
authentication methods are not appropriate in VANET. The only way of vehicle
recognition is by their MAC/IP addresses [5], [6]. The malicious user may easily
spoof these addresses. All these combined features make VANET extremely
vulnerable to various attacks. One such attack is a Sybil attack that is highly probable
in networks without centralized control, and where the nodes communicate in peer to
peer manner [2]. Therefore, infrastructure based/V2I communication/pure
cellular/WLAN architecture of VANET with the involvement of centralized fixed
infrastructure are less susceptible to Sybil attack. In comparison, the
infrastructureless/V2V communication/Pure Ad hoc deployment of VANET without
any centralized control where vehicles communicate in peer to peer manner is highly
vulnerable to Sybil attack. Sybil attack is a type of spoofing attack where a malicious
attacker present in VANET generates one or more virtual vehicles by using fake
identities in infrastructureless VANETs. These virtual vehicles that do not precisely
exist in the network but seem like a legitimate vehicle to all other vehicles are known
as Sybil vehicles [5], [6]. The malicious vehicle that generates these Sybil vehicles is
known as Sybil launcher. The existence of new vehicles disturbs all those mechanisms
where a total of vehicles play an essential role, such as fair resource allocation, voting
management, routing mechanism. Thus, the presence of a Sybil vehicle causes
excessive disruption in VANET. This paper presents a detailed survey of work carried
out on the Sybil attack in the field of VANETs. The remaining part of the paper is
organized as follows. Section 2 presents the survey of a Sybil attack on VANET.
Section 3 portrays Sybil attack in VANET in tabular form with the conclusion and
future scope in the end.
Many research papers discuss various attacks to which VANETs are susceptible,
including Sybil attack in VANETs [6]-[10].
B. Xiao et al. (2006) discuss a Sybil detection mechanism in VANET. This
mechanism requires GPS information to be accurate, and all vehicles to be equipped
with the same radio modules. The roadside base stations are to be deployed along the
entire road, and the identity of every vehicle participating in VANET is to be
authenticated by Electronic License Plate (EPL). This mechanism uses signal strength
received from the vehicle and compares whether the position claimed by the vehicle
and the position value calculated through signal strength differ. In case the compared
values vary, then the vehicle is assumed to be a Sybil vehicle [11]. T. Zhou et al.
(2007) propose a framework for the detection of a Sybil attack. The Department of the
Motor Vehicle (DMV) preserves the records of the vehicle and allocates certified
pseudonyms to vehicles. These certified pseudonyms are only given once to the
ISBN: 978-81-945631-7-4
61
vehicles, either at the vehicle registration time or at its renewal time. Roadside boxes
RSBs behave as a middle point between vehicles and the DMV for data distribution.
These RSBs by paying attention to vehicle activities, inform the DMV about any
suspicious vehicle in the VANET [12]. G. Guette et al. (2007) propose a Sybil
detection method using signal strength and directional antenna. The underlying
assumption used in this mechanism is that only a few areas may have Sybil vehicles
and authors have characterized those areas to detect Sybil vehicles. [13]. T. Zhou et
al. (2011) propose a method for Sybil detection with the assistance of the DMV that
behaves as a centralized authority. This mechanism provides unique pseudonyms to
the vehicles, thereby preserving the privacy of every vehicle. These pseudonyms are
stored in the Road Side Units (RSUs). By overhearing these pseudonyms, the RSB
verifies the authenticity of pseudonyms and hence, that of a particular vehicle [14]. M.
Rahbari et al. (2011) present and implement a cryptography based scheme for the
detection of Sybil attack in VANET. This method relies on fixed key infrastructure
for detecting a Sybil attack [15].
K.M. Rabieh et al. (2011) suggest a Public Key Infrastructure (PKI) based method
for the detection of Sybil attack in VANET. In this mechanism, the RSUs are placed
at a fixed distance all along the road, and the DMV acts as a centralized control that
holds personal information such as personal ID, digital signature. Utilizing this
information, Sybil vehicles are detected [16]. P. Kafil et al. (2012) present three
different categories to launch a Sybil attack communication, identity, and
participation. The authors have analyzed that the position of a Sybil launcher plays an
essential part in causing disruption to the network [17]. Naveen et al. (2013) propose a
Sybil detection and mitigation mechanism using the AODV protocol in VANET. A
new field in the AODV known as Secondary ID (SCID) is introduced. The
combination of sequence numbers with SCID uniquely identifies every vehicle in the
VANET and thus can quickly identify a Sybil vehicle [18]. T. M. D. Sales et al.
(2014) present a Sybil detection protocol working in three phases: registration,
assigning of pseudonym to the vehicle, and the authentication phase. This mechanism
preserves privacy using a multilevel architecture, and the use of pseudonyms and
group signatures helps in identifying the Sybil attack [19]. R. Hussain et al. (2014)
suggest the use of a centralized infrastructure such as an RSU for the detection of
Sybil attack. In this algorithm, the RSUs distribute pseudonyms to the vehicles, and
the data gathered through beacons are used to detect Sybil attack [20]. D. Jin et al.
(2014), without any pre existing infrastructure, propose a Sybil attack detection
mechanism that uses the physical measurement of message transmission to detect
Sybil vehicles [21].
Few papers discuss existing Sybil detection mechanisms [22], [23], [24]. P. V.
Kumar et al. present a system where the prevention algorithm uses the RSU to restrict
the allocation of timestamps at the initial stage to prevent Sybil attack. The system by
using batch authentication and key management scheme authenticate several requests
concurrently. This mechanism using Priority Batch Verification Algorithm (PBVA)
gives priority in processing the requests send by emergency vehicles such as an
ambulance, and such requests are instantly processed without any delay [25].
ISBN: 978-81-945631-7-4
62
H. Kaur et al. (2015) have presented an Intrusion Detection System (IDS) using a
Genetic algorithm for the prevention of Sybil attack. The authors have also analyzed
Sybil attack in the VANET using various network parameters with and without
employing a genetic algorithm and by varying the node configurations [26]. S. Gupta
et al. (2015) present a mechanism for the detection of Sybil attack in VANET. The
mechanism preserves the privacy of vehicles and is implemented using a genetic
algorithm [27]. K. Rabieh et al. (2015) propose a scheme to detect the Sybil attack in
VANET. The cross layer scheme is used that facilitates RSU to recognize a Sybil
vehicle. The logic behind this mechanism is to confirm the position of the vehicle(s)
as Sybil vehicle does not present at the position specified by it [28]. J. Grover et al.
(2015) have studied the disruption caused by a Sybil attack on VANET. The authors
though simulations have executed Sybil attach and have analyzed the performance of
VANET under such attack. The authors also present a Sybil detection mechanism for
Infrastructure based VANETs. The detection mechanism requires RSU to be placed
all along the road. A single RSU behaves as centralized management in its area and it
is used to store and authenticate parameters such as RSS value, the distance of a
vehicle. This enables the detection of a Sybil node [29]. A. Suman et al. (2016) have
explained routing protocols available for VANET. The authors discuss various
implications that Sybil attack might cause in the routing mechanism in VANET. To
show how the Sybil attack deteriorates the performance of routing protocols in
VANET, the authors have implemented a Sybil attack on VANET using AODV
protocol. Various network performance parameters are used to check the impact of the
Sybil attack in VANET [30].
A. Chawla et al. (2016) have presented an exhaustive survey of various techniques
used to detect Sybil attack in VANET [31]. S. Arora et al. (2016) have used the
OPNET simulator to examine the performance of AODV routing protocol under a
Sybil attack. The authors evaluate that AODV performed better under a Sybil attack
as compared to various other routing protocols available for VANET. They conclude
that AODV requires further improvement to deal with Sybil attack [32]. A. K. Sharma
et al. (2016) propose a model for the detection of a Sybil attack. In this technique, the
pseudo certificates generated help in preserving the privacy of the vehicle and with
the cooperation of neighboring vehicles detect the Sybil vehicle [33]. D. P. Mishra et
al. (2016) propose a scheme to detect Sybil attack using vehicle authentication using
digital signatures [34]. S. Gupta et al. (2016) present a vehicle privacy preserving
system using a bacterial foraging optimization algorithm to detect of Sybil attack [35].
P. Rawat et al. (2016) suggest a modification in the AODV routing protocol by using
an active route timeout concept for detection of Sybil attack in VANET, and the
protocol implementation is carried out in OPNET [36]. S. Saini et al. (2016) present a
survey on Sybil attack with various routing protocols existing for VANET [37]. A. S.
Bojnord et al. (2017) present a Sybil detection mechanism based on a fuzzy detection
mechanism [38]. X. Feng et al. (2017) provide a method to prevent Sybil attack
against multi source Sybil attacks. The mechanism ensures the privacy of a vehicle
using a trusted source to issue a certificate to the vehicles falling in its communication
range. By setting a reputation and trust threshold for each event, the allocation of false
messages is controlled [39]. A. Panchal et al. (2017) propose a technique for the
ISBN: 978-81-945631-7-4
63
detection of Sybil vehicles with stolen identities in VANET. In this technique, in case
a vehicle tries to distribute the false message, then the neighbor vehicles cooperate
with one other to build a trust value to prevent Sybil attack [40]. C.O. Iwendi et al.
(2018) present a Sybil attack detection technique based on meta heuristic technique
using a simulation framework. This technique uses a spider monkey strategy to check
Sybil attacks [41]. Z. A. Abdulkader et al. (2018) present a survey of various Sybil
detection techniques available in VANET [42].
S. Hamdan et al. (2018) explain various mechanisms available for Sybil attack
detection in VANET. The authors have proposed a hybrid algorithm utilizing Privacy
Preserving Detection of Abuses of Pseudonyms (P2DAP) as well as a footprint
algorithm for the detection of a Sybil attack in VANET [43]. H. Hamed et al. (2018)
have proposed and executed a Sybil attack detection scheme for a city environment.
In this scheme, the prime assumption is the availability of RSUs. A single mobile
vehicle may generally be in the proximity of one RSU. Whenever a vehicle comes in
the proximity of an RSU, the RSU provides a unique identification to the vehicle.
This logic is exploited to detect a Sybil attack in the city environment [44].
K. Singh et al. (2018) review various techniques for Sybil attack detection in
VANET. The authors have also presented a Sybil attack detection scheme based on
respective signal strength and monitor mode, where the RSU helps in the detection of
Sybil node [45]. K. Selvakumar et al. (2019) propose an Elliptic Curve Encryption
and Digital Signature (ECEBS) for security enhancement that uses digital signatures
for message communication in VANET. The authors also propose a Preference Batch
Authentication Algorithm (PRBAA) to deal with the Sybil attack. In this algorithm,
whenever vehicles need to communicate, the vehicle has to fetch a timestamp from
the RSU. At times whenever the RSU gets several requests from the vehicles
simultaneously, the RSU, even in the time of crisis, gives preference to vehicles such
as fire vehicles, ambulance [46]. Table 1 displays the literature work carried on Sybil
attack in VANET.
Table 1. Presents the literature work carried out on Sybil attack in VANET
S.N. Title Author Attack Details
1. Detection and localization of B. Xiao et · Mechanism for the detection of Sybil
Sybil nodes in VANETs al. (2006) vehicles based on RSSI
[11] · Require correct GPS information
· Require vehicles to be equipped with the
same radio module
· Vehicle authentication by Electronic
License Plate (EPL)
2. Privacy-Preserving T. Zhou et · Detection Mechanism using
Detection of Sybil Attacks in al. (2007) Centralized Authority
Vehicular Ad Hoc Networks · DMV maintains records & distributes
[12] synonyms to the vehicle
· Roadside Base units (RSBs) act as
intermediates
· Distribution of Pseudonyms at
registration or renewal.
3. On the Sybil attack detection G. Guette · Sybil detection using signal strength &
ISBN: 978-81-945631-7-4
64
in VANET [13] et al. directional antenna
(2007) · Identify the area where Sybil vehicle
may be present
4. P2DAP - Sybil Attacks T. Zhou et · Privacy preserving scheme P2DAP for
Detection in Vehicular Ad al. (2011) Sybil detection
Hoc Networks [14] · Centralized Authority-DMV & RSU
· Distribution of Pseudonyms
5. Efficient Detection of Sybil M. · Cryptography based scheme for the
Attack based on Rahbari et Detection of Sybil attack
Cryptography in VANET al. (2011) · Require fixed infrastructure such as
[15] RSUs
6. Combating Sybil Attacks in K.M. · PKI based method for detection of
Vehicular Ad Hoc Networks Rabieh et Sybil attack.
[16] al. (2011) · Require RSUs and DMV. Where DMV
acts as centralized management.
7. Modeling Sybil Attacker P. Kafil et · Sybil attacks implementation in
Behavior in VANETs [17] al. (2012) VANET
· The authors evaluate the behavior of
Sybil attacker
8. Detection and Prevention Naveen, · Sybil detection and mitigation
Using AODV in VANET R. Gill mechanism using AODV
[18] (2013) · New field in the AODV-Secondary ID
(SCID) to uniquely identify every
vehicle
9. A Privacy-Preserving T. M. · A Sybil detection protocol that works
Authentication and Sybil Sales et in three phases registration, allocation
Detection Protocol for al. (2014) of pseudonyms, the authentication
Vehicular Ad Hoc Networks phase
[19] · Utilize pseudonyms and group
signature
10. On Secure and Privacy- R. · Detection and prevention algorithm
Aware Sybil Attack Hussain, · Require centralized infrastructure such
Detection in Vehicular H. Oh as RSU
Communications [20] (2014) · Physical measurement of the message
to detect Sybil nodes
11. A Traffic Flow Theory D. Jin and · Without any pre existing infrastructure
Aided Physical Measurement J. Song · Physical measurement of message
Based Sybil Nodes Detection (2014) transmission
Mechanism in Vehicular Ad-
hoc Networks [21]
12. Detection and Localization K. · Various existing Sybil detection
of Sybil Attack in VANET: Malathi et mechanisms
A Review [22] al. (2014)
13. Defense mechanisms against M. A. · Explain various Sybil detection
Sybil attack in vehicular ad Mohamm mechanisms
hoc network [23] adi et al.
(2014)
14. Prevention of Sybil attack P. V. · RSU restricts the allocation of
and priority batch Kumar et timestamps at the initial stage
verification in VANETs [25] al. (2014) · Batch authentication & key
management scheme simultaneously
process several requests
ISBN: 978-81-945631-7-4
65
15 Efficient Detection & H. Kaur · Present an Intrusion Detection System
Prevention of Sybil Attack in and P. (IDS) using a Genetic algorithm for the
VANET [26] Bansal prevention of Sybil attack
(2015)
16. Prevention of Sybil attacks S. Gupta · Prevention of Sybil attack in VANET
in VANETs using genetic et al. using a genetic approach
approach [27] (2015)
17. Cross-Layer Scheme for K. · The cross layer scheme is used that
Detecting Large-scale Rabieh et facilitates RSU to recognize a Sybil
Colluding Sybil Attack in al. (2015) vehicle
VANETs [28]
18. Multivariate verification for J. Grover · Detection mechanism for Infrastructure
Sybil attack detection in et al. based VANET with RSUs requirement
VANET [29] (2015) · Use RSS value to calculate the distance
of a neighbor vehicle
19. A Behavioral Study of Sybil A. Suman · To show the impact of Sybil attack on
Attack on Vehicular et al. routing protocols
Network [30] (2016) · A Sybil attack using AODV
20. Comparative Analysis of A. · Present a comprehensive survey of
Sybil Attack Detection Chawala various techniques to detect Sybil
Techniques in VANETs [31] et al. attack in VANET
(2016)
21. Performance Evaluation of S. Arora · Compute the performance of AODV
Vehicular Ad Hoc Networks et al. routing protocol with Sybil attack
under Sybil Attack [32] (2016)
22. Sybil Attack Prevention and A. K. · Technique for detection of Sybil attack
Detection in Vehicular Ad Sharma et using pseudo certificates
hoc Network [33] al. (2016) · Beacons for neighbor detection, RSUs
& Certification Authority
23. A Novel Approach to Detect D. P. · A scheme to detect Sybil attack using
Sybil Attack in VANET [34] Mishra et node authentication using digital
al. (2016) signatures
24. Prevention of Sybil Attacks S. Gupta · Present an algorithm using a bacterial
in VANETs Using Bacterial et al. foraging optimization to detect of Sybil
Foraging Optimizations (2016) attack
Algorithm [35]
25. Prevention of Sybil attack in P. Rawat · Use bacterial foraging optimization
vehicular ad hoc networks et al. algorithm for prevention of Sybil
using active route timeout (2016) attack
approach [36]
26. A Detail Review on Sybil S. Saini et · Present a survey on Sybil attack with
Attack and Various Routing al. (2016) various routing protocols in VANET
Protocols in Vehicular Ad
Hoc Network [37]
27. A Secure Model for A. S. · Sybil detection mechanism based on a
Prevention of Sybil Attack in Bojnord et fuzzy detection mechanism
Vehicular Ad Hoc Networks al. (2017)
[38]
28. A method for defensing X. Feng et · Prevent Sybil attack against multi
against multi-source Sybil al. (2017) source Sybil attacks
attacks in VANET [39] · Using a trusted source to issue a
certificate
ISBN: 978-81-945631-7-4
66
29. Segregation of Sybil Attack A. · For detection of Sybil attack
using Neighbouring Panchal et · Neighbour vehicles cooperate with one
Information in VANET [40] al. (2017) other to build a trust value
30. On Detection of Sybil Attack C.O · Sybil detection based on meta heuristic
in Large-Scale VANETs Iwendi et technique
using Spider-Monkey [41] al. (2018)
31 A Survey on Sybil Attack Z. A. · Survey of various Sybil detection
Detection in Vehicular Ad Abdulkad techniques
hoc Networks (VANET) er et al.
[42] (2018)
32. Detecting Sybil attacks in S. · Sybil detection algorithm
vehicular ad hoc networks Hamdan · Hybrid algorithm utilizing P2DAP as
[43] et al. well as footprint algorithm
(2018)
33. Sybil Attack Detection in H. Hamed · A Sybil attack detection scheme for a
Urban VANETs Based on et al. city environment
RSU Support [44] (2018) · Existence of RSU
34. Evaluation of proposed K. Singh · Review various techniques for Sybil
technique for detection of et al. attack detection in VANET
Sybil attack in VANET [45] (2018)
35. Security Issues and K. · Propose an Elliptic Curve Encryption
Analysing Sybil Attack Selvakum and Digital Signature (ECEBS) for
Detection in VANET [46] -ar et al. security enhancement that uses digital
(2019) · Before communication vehicles
require timestamp from the RSU
36. Analysis of Sybil attack Sudha et · Review various existing mechanisms
isolation technique in al. (2019) for the detection and prevention of
VANET [24] Sybil attack
VANET is a communication network, and the sole rationale for its deployment
entirely relies on the on-time information delivery of its numerous applications. In
addition to the timely delivery of information, the information delivered should be
reliable, accurate with QoS, and low latency communication. Sybil attack through its
launched Sybil vehicles may disturb the VANET. Sybil launcher through its Sybil
vehicles may increase the time delay, increase the latency of communication, or
deliver fake information by modifying, truncating, or dropping few or all data packets
in VANET. This disruption in communication shows that the Sybil attack in VANET
is the most hazardous attack, and appropriate measures are required to prevent this
attack.
The above literature survey indicates that very little work has been conducted to
eliminate Sybil attack in VANET. Most of the papers reveal that the existing Sybil
attack detection and prevention mechanisms are insufficient. Moreover, most of the
detection and prevention mechanisms have been proposed for infrastructure based
VANET, require a centralized authority such as a Certification Authorities (CA) or
Department of Motor Vehicle (DMV) for authentication of vehicles, to detect and
ISBN: 978-81-945631-7-4
67
further prevent Sybil attack. None of the research papers in the survey talks
distinctively about Sybil attack in the infrastructureless/pure ad hoc deployment of
VANETs where Sybil attack is most prevalent. Thus appropriate mechanisms for
detection and prevention of Sybil attack in infrastructureless VANETs are the prime
requirements for the sustainability of these networks.
References
1. Chandramouli V.: A Detailed Study on Wireless LAN Technologies. (Dept. of Comp. Sci.
and Engineering, Univ. of Texas at Arlington),
http://www.uta.edu/oit/policy/ns/docs/wireless-paper-vijay.pdf. last accessed 2019/12/15.
2. Pietro, R. D., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc
networks - a survey. Journal of Computer Communications 51, 1–20 (2014).
3. Papadimitratos, P., Fortelle, A.D.L., Evenssen, K., Brignolo, R., Cosenza, S.: Vehicular
communication systems: enabling technologies, applications, and future outlook on
intelligent transportation. Communication Magazine IEEE 47(11), 84–95 (2009).
4. Li, F., Wang, Y.: Routing in vehicular ad hoc networks: a survey. Vehicular Technology
Magazine IEEE 2(2), 12–22 (2007).
5. Newsome, J, Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis &
defenses. In: 3rd International Symposium on Information Processing in Sensor Networks.
pp. 259–268. IEEE, Berkeley, USA (2004).
6. Al-Kahtani, M. S.: Survey on security attacks in vehicular ad hoc networks (vanets). In:
6th International Conference on Signal Processing and Communication Systems. pp. 1–9.
Gold Coast, QLD (2012).
7. Samara, G., Wafaa, A.H., Salihy, A., Sures, R.: Security Analysis of Vehicular Ad Hoc
Networks (VANET). In: Second International Conference on Network Applications,
Protocols and Services, IEEE, Malaysia (2010).
8. La, V.H., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a
survey. International Journal of Ad hoc Networking Systems 4(2), 1–20 (2014).
9. Mane, A.: Sybil attack in VANET. International Journal of Computational Engineering
Research 7(3), 249-253, (2016).
10. Sharma, S., Sharma, S.: A Review: Analysis of Various Attacks in VANET. International
Journal of Advance Research in Computer Science 10(3), (2016).
11. Xiao, B., Yu, B., Gao, C.: Detection and localization of sybil nodes in VANETs. In: Proc.
of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor
Networks (DIWANS ’06), pp. 1–8. Los Angeles, CA, USA(2006).
12. Zhou, T., Roy, R. et al.: Privacy-preserving detection of sybil attacks in vehicular ad hoc
networks. In: 4th International Conference on Mobile and Ubiquitous Systems: Networking
& Services MobiQuitous, Philadelphia, USA (2007).
13. Guette, G., Ducourthial, B.: On the Sybil attack detection in vanet. In: IEEE International
Conference on Mobile Adhoc and Sensor Systems, Pisa, Itly (2007).
14. Zhou, T., Choudhury, R., Ning, P., Chakrabarty, K.: P2dap – sybil attacks detection in
vehicular ad hoc networks. IEEE Journal on selected areas of communications 29(3),
(2011).
15. Rahbari, M., Jamali, M.A.J.: Efficient detection of sybil attack based on cryptography in
VANET. International Journal of Network Security and its Applications 3(6), (2011).
ISBN: 978-81-945631-7-4
68
16. Rabieh, K.M., Azer, M. A.: Combating sybil attacks in vehicular ad hoc networks. In:
Ozcan A., Zizka J. Nagamalai D. (eds) Communication in Computer and Information
Science, Springer, Berlin, Heidelberg (2011).
17. Kafil, P., Fathy, M., Lighvan, M. Z.: Modeling sybil attacker behavior in VANETs. In: 9th
International ISC Conference on Information Security and Cryptology, IEEE, Iran (2012).
18. Navneet and Gill, R.: Sybil attack detection and prevention using AODV in VANET.
International Journal of Computer Science & Management Studies 13(07), (2013).
19. Sales, T. M. D., Almeida, H. O. et al.: A privacy-preserving authentication and sybil
detection protocol for vehicular ad hoc networks. In: IEEE International Conference on
Consumer Electronics (ICCE), (2014).
20. Hussain, R., Oh, H.: On secure and privacy-aware sybil attack detection in vehicular
communications. Wireless Personal Communication (2014).
21. Jin, D., Song, J.: A traffic flow theory aided physical measurement based sybil nodes
detection mechanism in vehicular ad-hoc networks. In: 13th International Conference on
Computer and Information Science (ICIS), IEEE/ACIS, Taiyan, China (2014).
22. Malathi, K., Manavalan, R.: Detection and localization of sybil attack in vanet: a review.
International Journal for Research in Applied Science and Engineering Technology 2(9),
282-293 (2014).
23. Mohammadi, M.A., Pouyan, A. A.: Defense mechanisms against sybil attack in vehicular
ad hoc network. Security Comm. Networks 8(6), (2014).
24. Sudha, Kumar, K., Malhotra, R.: Analysis of sybil attack isolation technique in vanet.
International Journal of Computer Science and Mobile Computing 8(5), 187-192 (2019).
25. Kumar, P.V., Maheshwari, M.: Prevention of sybil attack on priority batch verification in
vanets. In: International Conference on Information Communication and Embedded
Systems (ICICES2014), IEEE, India (2014).
26. Kaur, H., Bansal, P.: Efficient detection & prevention of sybil attack in vanet. International
Journal of Innovative Science, Engineering & Technology 2 (9), (2015).
27. Gupta, S., Aulakh, T. S.: Prevention of sybil attacks in vanets using genetic approach.
International Journal of Computer Science and Mobile Computing (IJCSMC) 4 (12), 88 –
102 (2015).
28. Rabieh, K., Mahmoud, M.E. A., Guo, T.N, Younis, M.: Cross-layer scheme for detecting
large-scale colluding sybil attack in vanets. In: International Conference on
Communications (ICC), IEEE, London (2015).
29. Grover, J., Gaur, M.S., Laxmi, V.: Multivariate verification for sybil attack detection in
vanet. Journal of Open Computer Science, De Gruyter (2015).
30. Suman. A., Kumar, C.: A behavioral study of sybil attack on vehicular network (2016).
31. Chawla, A., Patial, R. K., Kumar, D.: Comparative analysis of sybil attack detection
techniques in vanets. Indian Journal of Science and Technology 9(47), (2016).
32. Arora, S., Chugh, U.: Performance evaluation of vehicular ad hoc networks under sybil
attack. International Journal of Innovative Research in Computer and Communication
Engineering 4(9), (2016).
33. Sharma, A.K., Saroj, S.K., Chauhan, S.K., Saini, S. K.: Sybil attack prevention and
detection in vehicular ad hoc network. In: International Conference on Computing,
Communication and Automation (ICCCA2016), IEEE, Noida, India (2016).
34. Mishra, D. P., Asutkar, D. P.: A novel approach to detect sybil attack in VANET.
International Journal of Innovative Research in Science, Engineering and Technology
5(10), (2016).
ISBN: 978-81-945631-7-4
69
35. Gupta, S., Aulakh, T. S.: Prevention of sybil attacks in VANETs using bacterial foraging
optimizations algorithm. International Journal of Computer Science Trends and
Technology (IJCST) 4(3), (2016).
36. Rawat, P., Gupta, S.: Prevention of sybil attack in vehicular ad hoc networks using active
route timeout approach. International Journal of Science, Engineering and Technology
Research (IJSETR) 5(6), (2016).
37. Saini, S., Kumar, J.: A detail review on sybil attack and various routing protocols in
vehicular ad hoc network. International Journal of Innovative Research in Computer and
Communication Engineering, (2016).
38. Bojnord, A.S., Bojnord, H.S.: A secure model for prevention of sybil attack in vehicular ad
hoc networks. International Journal of Computer Science and Network Security 17(1),
(2017).
39. Feng. X., Li. C., Chen, D., Tang, J.: A method for defensing against multi-source sybil
attacks in VANET. Peer-to-Peer Netw. Appl., (2017).
40. Panchal, A., Singh, D.: Segregation of sybil attack using neighbouring information in
VANET. International Advanced Research Journal in Science, Engineering and
Technology, (2017).
41. Iwendi, C. O, Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., Bashir, A. K.: On
detection of sybil attack in large-scale VANETs using spider-monkey technique. IEEE.
(2017).
42. Abdulkader, Z. A, Abdullah, A., Abdullah, M.T., Zukarnain, Z. A.: A survey on sybil
attack detection in vehicular ad hoc networks (VANET). Journal of Computers. 29(2), 1-6
(2018).
43. Hamdan, S., Hudaib, S. Awajan, S.: Detecting sybil attacks in vehicular ad hoc networks.
International Journal of Parallel, Emergent and Distributed Systems (2019).
44. Hamed. H., Haddad, A., Haghighi, G.: Sybil attack detection in urban VANETs based on
RSU support. In: 26th Iranian Conference on Electrical Engineering (ICEE2018), (2018).
45. Singh, K, Kaur, H.: Evaluation of proposed technique for detection of sybil attack in
VANET. International Journal of Scientific Research in Computer Science (2018).
46. Selvakumar, K., Kumar, S. N.: Security issues and analyzing sybil attack detection in
VANET. International Journal of Recent Technology and Engineering (IJRTE) 7(5),
(2019).
ISBN: 978-81-945631-7-4
70
Mitigating Aspects of Disadvantages in Biodiesel
Production
Malayaj Srivastava
Department of Chemical Engineering,
Pandit Deendayal Petroleum University, Gandhinagar, Gujarat, India
Abstract. Biofuels are a developing kind of fuel whose origin is biomass. Among
them, many different kind of fuels can be found: bioethanol, biobutanol, bio-
diesel, vegetable oils, bio methanol, pyrolysis oils, biogas, and biohydrogen. This
project is concerned with the biodiesel and mainly with the mitigation aspects
regarding the disadvantages in the production of biodiesel.
Keywords:
1 Introduction
In 1893, Rudolph Diesel firstly operated his new engines using vegetable oil (peanut
oil) where petroleum was not available at that time. His first experiment has inspired
many researchers to study further about biodiesel. Since then, biodiesel production is
developed until now.
For several years, warnings about the depletion of the oil reserves have been transmit-
ted. However, nowadays, that is not a reality, or, at least, it is not a public reality. It is
almost impossible to determine how long it will be possible to live in the petroleum era.
Nevertheless, it is a reality that, eventually, the problem will have to be faced.
Biodiesel has a great potential due to its environmental benefits mainly in the urban
areas. Also, this combustive has been seen as a strategic source of renewable energy to
substitute the diesel and other petroleum products [1]. Biodiesel is an alternative to
diesel which has numerous benefits, such as its applicability to be used individually or
blended with diesel in diesel engines without requiring any engine modifications. More-
over, it emits lower air pollutants such as carbon monoxide and sulphur dioxide, etc.
as compared to those emitted from the combustion of diesel [2].Afterwards, that bio-
diesel can be used blended with mineral diesel in different proportions or without blend-
ing, what is called B100, in diesel engines. Biodiesel is also suitable for direct burning.
ISBN :978-81-945631-7-4
71
2 Disadvantages in the Main technologies used for the
production of biodiesel
Homogeneous base catalysts are commonly used in the industries due to modest oper-
ation condition, high conversion, low reaction time (typically 1 h), high catalytic activ-
ity, wide availability, and low cost. In general, base catalytic transesterification pro-
cesses are carried out at low temperatures and pressures (333–338 K and 1.4–4.2 bar)
with low catalyst concentrations (0.5–2 wt%) [7,8].
The limitations of homogenous base catalyst are due to the sensitivity to purity of reac-
tants, free fatty acid content, as well as to the water concentration of the sample. When
the oils contain free fatty acid and water, they can form large amount of soap. The fatty
acids will react with the basic catalyst to produce soaps which inhibit the separation of
glycerin and biodiesel. Water makes the reaction to partially change to saponification
and reduces catalyst efficiency. The soap causes an increase in viscosity and formation
of gels which reduces ester yield and hinders the separation of glycerol[7,8].
ISBN :978-81-945631-7-4
72
of homogeneous acid catalytic over homogeneous base catalytic transesterification is
their low susceptibility to the presence of free fatty acid in the feedstock [6] [8]. How-
ever, homogeneous acid catalytic transesterification is more sensitive to water contents
of the feedstock [14]. The presence of water inhibits the conversion to biodiesel. Other
disadvantages are corrosion of equipment, more waste, formation of secondary prod-
ucts, higher temperature, long reaction times, and weak catalytic activity [5] [8] [9].
There are two noncatalytic transesterification processes. These are the supercritical al-
cohol processes[5, 8].
Supercritical alcohol methods consist of using high pressure and temperature instead of
using catalysts to carry out the transesterification reaction [5,10]. The reaction is fast
and conversion rises to 50–95 % for the first 10 min, but it requires a temperature range
of 250–400 °C. This method has proved to be the most promising process, and it uses
the supercritical conditions of alcohols, such as methanol, ethanol, propanol, or butanol.
The disadvantages of the supercritical methods are the necessity of high pressure and.
temperature and high methanol to oil ratios and consequently expensive production [5
10].
The rate of conversion of oil into ester is very slow due to low solubility of methanol
in oil. A way to overcome these problems without using a catalyst is the use of cosol-
vent which is soluble in both methanol and oil . The result is a fast reaction, on the order
of 5–10 min, without catalyst residues. Tetrahydrofuran is an example of such cosol-
vents. It has a boiling point very close to that of methanol, and the system requires a
rather low operating temperature of 30 °C. The process consists in the conversion of
triglycerides and free fatty acids at atmospheric pressures and near ambient tempera-
tures in a two-step, single-phase, and continuous process, all in less than 90 min. This
process can to convert not only vegetable oils but also waste cooking oils and animal
fats [12].
ISBN :978-81-945631-7-4
73
References
[1] Doná, Cardozo-Filho, Silva, and Castilhos. "Biodiesel production using su-
percritical methyl acetate in a tubular packed bed reactor." Fuel processing
technology 106: 605-610, 2013.
[2] Goembira, Fadjar, Kosuke Matsuura, and Shiro Saka. "Biodiesel production
from rapeseed oil by various supercritical carboxylate esters." Fuel 97: 373-
378, 2012.
[3] Ma F, Clements LD, Hana MA (1998) The effects of catalyst, free fatty ac-
ids and water on transesterification of beef tallow. Trans ASAE 41:1261–
1264
[4] Rashid U, Anwar F (2008) Production of biodiesel through optimized alka-
line catalysed transesterification of rapeseed oil. Fuel 87:265– 273
[5] Freedman B, Butterfield RO, Pryde EH (1986) Transesterification kinetics
of soybean oil. J Am Oil Chem Soc 63:1375–1380
[6] Freedman B, Pryde EH, Mounts TL (1984) Variables affecting the yields of
fatty esters from transesterified vegetable oils. J Am Oil Chem Soc
61:1638–1643
[7] Iso M, Chen B, Eguchi M, Kudo T, Shrestha S (2001) Production of bio-
diesel fuel from triglycerides and alcohol using immobilized lipase. J Mol
Catal B Enzym 16:53–58
[8] Demirbas A (2003) Biodiesel fuels from vegetable oils via catalytic and
non-catalytic supercritical alcohol transesterifications and other methods: a
survey. Energy Convers Manag 44:2093–2109
[9] Canakci M, Gerpen JV (1999) Biodiesel production via acid catalysis.
Trans ASAE 5:1203–1210 12. Enamul Hoque M, Singh A, Chuan YL
(2011) Biodiesel from low cost feedstocks: the effects of process parame-
ters on the biodiesel yield. Biomass Bioenergy 35:1582–1587
[10] César AS, Batalha MO (2010) Biodiesel production from castor oil in Bra-
zil: a difficult reality. Energy Policy 38:4031–4039
[11] Abbaszaadeh A, Ghobadian B, Omidkhah MR, Najafi G (2012) Current bi-
odiesel production technologies: a comparative review
[12] Lee JS, Saka S (2010) Biodiesel production by heterogeneous catalysts and
supercritical technologies. BioresourTechnol 101:7191– 7200
ISBN :978-81-945631-7-4
74
The effect of Design parameters on Fused Deposition
Snap-Fit components: A Review
Abstract. In this paper, the various design aspects of the fused deposited snap-
fit component are presented. The cantilever snap joints are omnipresent and
used widely in various applications. The design features like cantilever length,
width, insertion angle, and retention angle, etc. greatly influence the force
required for assembling and disassembling of two elements. Generally, snap-fit
joints are produced with injection molding. The recent development in Fused
Deposition machines allows users the freedom to fabricate various intricate
shapes. The properly selected polymer material for a given application plays an
important role. There are numerous polymers like ABS, PLA, etc which can be
easily molded and 3D printed into the required product.
Keywords: Snap-fit, Insertion angle, Retention angle, ABS, PLA, Design
features
1 Introduction
ISBN :978-81-945631-7-4
75
Polylactic Acid (PLA), also provides excellent strength. PLA is less susceptible to
warpage as compared to ABS. ABS and PLA are widely used in the FDM technique.
Snap-fit joints can be used to assemble parts more efficiently without any extra tool or
fastener. The design features enable self-locking. The user doesn't necessarily have to
have access to snap-fit joints to assemble it in some cases. Because of this Snap-fit
assembly can be automatized easily [2]. A snap-fit joint can either be permanent or
temporary and can be released by a force or tools. The flexibility of features is the key
criterion for snap-fit assembly and disassembly [3].
2 Literature review
Nectarios Vidakis et al. [1] in this work, experimentally measured the compressive
strength of the parts that are built with the FDM modeling process. ABS and ABS
plus parts were built with Stratasys Dimension BST758 and Stratasys Dimension Elite
additive manufacturing machines respectively. ASTM D696 standard is used to test
the parts that were built with different building parameters. Schenk Trebel tensile
testing machine is used. ABS parts with large layer thickness had lower compressive
strength and ABS plus show the same strength for all cases. ABS plus specimen had
about double the compressive strength than ABS specimen, while ABS plus had a
lower compressive strength than the stock ABS material.
Christoph Klahn et al. [2] showed that Snap-fits are the cheapest joints. They can be
connected promptly. Many of the Snap-fit parts have geometrically complexity. Due
to some limitations of injection molding, they can be manufactured using Additive
manufacturing in small and medium scale. Existing design features were challenged
with additive manufacturing. It is found that severely complex parts can be
manufactured with Additive manufacturing. The working of the snap-fit is found to be
independent of the type of manufacturing method used for manufacturing. product
and user handling integration are improved with the ease of additive manufacturing.
Snap-fit joints are simple and cheap for joining for plastic products. The advantages
and disadvantages of the use of additive manufacturing in the case of snap-fit joints
are analyzed. The joining and the release mechanisms will benefit significantly from
the ability to create more critical kinematics in case of conventionally designed snap-
fits.
Emilio A et al. [3] used additive manufacturing technology and complex parts were
produced. Depending on the printer capability the parts produced have dimensional
constraints. The constraint can be avoided by producing different sub-components and
assembling them using snap-fits. The component is produced using the coupling of
snap-fit joints. A case study is presented to study part assembly and model division in
terms of support material requirement, feature resistance and time required for the
printing.
R. Hernandez et al. [4] examined to get maximum functionality and technical
features in the 3D printed components that were characterized under static loading
conditions like compression, tensional flexure and are manufactured in different
orientations. The results of the compression test using ASTM D695,4-point flexure
test using ASTM D790 and tensile test using ASTM D638 Type-1 were compared.
ISBN :978-81-945631-7-4
76
By using the uPrint SE Plus 3D printer, different ASTM standard components were
built in different orientations. The ABS plastic was used for the same. Even though
the orientations were altered, It is observed that there is no considerable change in the
tensile strength of ABS P430 with 9.36 MPa as the lowest value and 10.8 MPa as the
highest value.
Eamon Whalen et al. [5] used OptiStruct software for finite element analysis of
snap-fits. After creating the simulation model, the respective design changes were
made in the design aspects to get the required insertion and retention forces. In the
further part, HyperStudy and HyperMesh morphing used to optimize the snap-fit
design. The required retention and insertion forces were obtained by minimizing mass
and ensuring the integrity of the structure. The approach provided in the report can
minimize design time, material use and the failure rate of snap-fits.
In this study, a cantilever snap-fit model was prepared using HyperMesh and analyzed
with OptiStruct. It was determined that the insertion force was too large and that the
extraction force was too small (in this case the force targets were arbitrary). Next,
design optimization was performed on the model to achieve the desired insertion and
extraction forces. HyperStudy was used to systematically generate several variations
of the nominal design and test them to determine the optimal design.
3 Problem Identification
The snap-fits contain interconnecting locking features which help in assembling and
disassembling along with locating features for proper alignment. The elastic
deflection and retention of the mating parts are responsible for confining the motion
between the mating portion in the assembly direction [3]. The design aspects of snap-
fit components affect the intensity of the retrieval force required. The different
applications of snap-fit calls for different retrieval forces.
4 Design
If the exact forces are not yet known while designing the model, to set the appropriate
values for the dimensions, most commonly the deflection and strain values are used
rather than force and stress values. The dimension values will be depending on the
maximum strain during deflection and not on the force required to assemble or
disassemble.
So we go for simulation of standard cantilever snap-fit component where we
understood the region of maximum stress and deflection. The design of snap-fit
changes as space and deformation constraints will be there depending on the
application.
The analysis of snap-fit can be done as follows:
The snap-fit is treated as a cantilever beam (the same as the designing of gear tooth).
The perpendicular component P causes the bending moment about the base of the
cantilever. Just like the Lewis equation for gear tooth, the following assumptions are
imposed on the snap cantilever.
ISBN :978-81-945631-7-4
77
1. The component of force along the axial direction of the cantilever is assumed to be
negligible.
2. The direction of the force which causes bending of the beam is assumed to be fixed
and acting perpendicular to the axis of the cantilever.
3. The effect of stress concentration is neglected[10].
ISBN :978-81-945631-7-4
78
5 Scope for the variation in the Design
6 Advantages
1. Saves time.
2. Reduced manufacturing cost in production by reducing material costs.
3. A great way for companies to reduce their part assembly costs.
4. Using snaps in place of mechanical fasteners can save costs in material and
labor.
5. Reduces administrative costs and costs associated with warehouse space by
reducing the number of components in an assembly to be managed.
6. Improves ease of assembly.
7 Disadvantages
1. The addition of snaps into the part design will likely increase the tooling cost and
lead time due to increased complexities to the mold.
2. May not provide as strong of a retention force between two components as a
mechanical fastener (screw, nut, bolt) would provide.
ISBN :978-81-945631-7-4
79
8 Conclusion
1. Depending on the application, the insertion, as well as retention force values for
cantilever snap-fit, can be changed. They are the functions of geometric features.
2. The optimization in design with proper consideration leads saving of material
and improved productivity.
Acknowledgment
The authors acknowledge the infrastructure and support of Walchand College of
Engineering, Sangli.
References
ISBN :978-81-945631-7-4
80
COMPARATIVE STUDY OF EDGES OF THERMAL
IMAGES USING GRADIENT, LAPLACIAN, CANNY
OPERATORS: A Critical Review
1 INTRODUCTION
ISBN :978-81-945631-7-4
81
2 IMPLICATION OF IH IMAGERY
The induction heat imagery foremost perceives, furthermore exhibits the distinctions in
heat energy. It, later on, based on those heat distinctions creates hued or GS illus-tra-
tions. IH energy may be a segment of gamut, however, it owns wavelengths that can
not be examined via human scrutiny.As a result, it is doable to use IH imagery with
regards to image formation whilst not exploiting any actinic ray.This allows them to
choose informed little temperature variations in obscurity, along with precise weather-
related traits like dust, smog, etc.All the objects in the universe correspond to certain
heat traits hence possess some amount of IH emissions always. In fact, per certain the-
ories and researches, anything and everything beyond the AZ (the temper-ature at
which all sorts of atomic activities cease completely) radiate a certain amount of IH
and these emissions can be trapped via suitable IR capturing devic-es(cameras) within
the optimal state of affairs. The extent of IH emissivity is directly proportional to the
torridness of a body(object).
Humanistic prospects are able to perceive the target(image) that are lit up by sunlight or
another form of light at peculiar intuition in the viewable visional range. In contrary to
this IR camcorders detect warmth radiate by objects. IR radiation is an EM emission of
tiny molecules called photons.
Every objects at temperatures beyond utter zero (-273°C or -459.69°F) transmit crimson
emission, and that is why transmission and observation is transferred and detected by IR
(thermal) cameras. This is why a thermal camera can operate even in complete darkness.
IR IMAGING
ISBN :978-81-945631-7-4
82
Figure 1. Classification Of IR Imaging
The extremities, boundaries or edges in all sorts of images correspond to the varia-tions
in ocular potency. In order to examine these extremities, disruptions in luminosi-ty is
observed. The perception of extremities of images is incorporated via image segmenta-
tion and information extraction in various scientific and research related assignments.
It is of utmost relevance to us to observe the extremities because most of the information
in IH technology is contained in them and extracting merely the boundaries enables us
to have a great extent of pros like memory economiz-ing.[2][6][11]
This is the ultimate effectual modus operandi. The clever approach contradictory to
threshold exposure. This method practise two absolutely distinctive inception (to re-
mark vigorous and fragile threshold) and encompass the vigorous edges in the product
given that they dete-tion process in that it utilizes 2 entirely separate thresholds (to
note hard and weak edges) and incorporates weak edges in the performance because
they are related to solid edges. This technique is less likely to be rigid than the others.
In certain instances, the simulation of a Dual Dimension Gaussia is expen-sive, and it
is proximateby two dimensional Gaussians, one in the x vein and another in the y vein.
ISBN :978-81-945631-7-4
83
i. Nonmaximum eradction:
Edg-es may happen at the most points of the gradient. Consequently, not all references
can be omitted at the limit. In terms of trying to do so, each picture dimension is deter-
mined on the amplitude and orientation of the slope Instead, for each image fea-ture,
test whether the amplitude of the slope is greater at a distance of one pixel in either the
positive or the negative direction right angles to the gradient. If not wider than any
picture aspect, eliminate it.
The threshing process used by the Canny Edge Detector is referred to as "per-
turbation." Almost everyone uses a substantial threshold and an occasional
threshold. If a function contains a value at the top of a massive level it is set
as a specific item. If the feature has a value at the apex of the low threshold
and is the neighbor of the simple function, it's the same.[4][2]
The SO perceives image extremities by scheming the image potency's gradient values
at per-capita pel(picture element) not beyond the illustration. It schemes along with the
guidance of the most vital increment from lightweight towards opacity, henceforth the
perception in a particular direction. The outputs predict however suddenly or swim-
mingly the image varies at every pel. As the aftermath based on the luminosity of re-
spective pel depicts after what precedent the extremities are guided.[8].
ISBN :978-81-945631-7-4
84
These TK are formulated to reply superlatively to extremities operating
transversely and longitudinally wrt the component grid, 1 TK is allotted
corresponding to the 2 perpendicular prescriptions. Both of the above
mentioned TK are enforced in succession to the input illustrations to con-
tribute disjoint assessment of the gradient part in every prescription (re-
ferred to as Sx and Sy). The above mentioned will then be united to ci-
pher the utter significance of gradient for entire prospects and also the
angular adaptation corresponding to the gradient [3]. ]. The gradient signifi-
cance is accustomed as:
which is much quicker to cipher .The angular adaptation of the edge (extremities rela-
tive to the pel grid) gives surge to dimensional gradient is ciphered as:
ISBN :978-81-945631-7-4
85
performance. The pixel values are the measured magnitude of the spatial gradient of
the input value at that time for some reason inside the image.
1 0 0 1
0 -1 -1 0
Sx Sy
ISBN :978-81-945631-7-4
86
Figure 4: Output of Robert Operator
-1 0 1 1 1 1
-1 0 1 0 0 0
-1 0 1 -1 -1 -1
Sx Sy
The above mentioned will then be united in order to cipher the utter significance of
gradient for entire prospects and also the angular adaptation corresponding to the gra-
dient . The gradient significance is accustomed as
ISBN :978-81-945631-7-4
87
which is much quicker to cipher .The angular adaptation of the edge (extremities rela-
tive to the pel grid) gives surge to dimensional gradient is ciphered as:
The Laplacian L(m,n) of an illustration with an aspect intensity value of I(m,n) is ci-
phered
L(m,n)= (8)
It uses a hybrid filter that is a concoction of gaussian and laplacian convolution filters
The three kernels used are estimated second derivatives, which are typi-
cally low and very reverberation sensitive.
0 1 0 1 1 1 -1 2 -1
1 -4 1 1 8 1 2 -4 2
0 1 0 1 1 1 -1 2 -1
ISBN :978-81-945631-7-4
88
As seen in the illustration applying the log operator to the image, the edge of the image
can be identified with the aid of these three kernels.
The preprocessing stage decreases low wavelength noise aspect until differentiation
here convolution is associative so we have a preference to convolute mathematical
smoothing filter with laplacian filter. So there are two benefits, due to small kernels,
fewer arithmetic operations are needed and LOG operator kernel is pre-calculated so it
is necessary to evaluate at runtime.[2]
The LOG extremities perception operator was quite a vital technique (before Canny).
It's also a gradient-based operator that operates in two extensive treads; formerly the
pertinence of a Gaussian filter abolishes the commotions in the image signal subse-
quently the Laplacian operator recognizes the acute extremities in it by administering
the double derivative methodology. It employs on zero-crossing methodology. The
Gaussian operant is designated by the principle of operation :-
G (m, n) =
……………………(9)
Where, s is standard deviation, and m and n being the rows and columns
LOG =
+ ……..(10)
ISBN :978-81-945631-7-4
89
S.NO. OPERANT TURBULENCE MISLEADING
SUBTILITY EXTREMITIES
SPACE
TIME
1 SOBEL MINOR MAJOR FEWER MAXIMUM
2 CANNY MINOR MAJOR FEWER MINIMUM
3 ROBERT MINOR MAJOR SUBTILITY MAXIMUM
4 PREWITT MAJOR MINOR FEWER MAXIMUM
5 ZERO MINOR FEWER MAXIMUM
CROSSINGS MAJOR
5 EXECUTION FRAMEWORK :-
ISBN :978-81-945631-7-4
90
5.1 Moderated Square Error:-
Operator ratio can be defined as the ratio between untreated thermal image sizeto the
treated thermal image size.
OR = untreated thermal image size/treated thermal image size ………. (13)
All the three parameters mentioned above depict the comparative performance of the
respective operators incorporated.[3]
ISBN :978-81-945631-7-4
91
ISBN :978-81-945631-7-4
92
Fig . (a) Comparison Chart
(b) Moon Surface Imaging Chart Obtained from NASA
(c) O/P Image (I) of All Operators.
(d)O/P Image (II) of All Operators
6 CONCLUSION
This paper explains the specific edge detection confronts for thermal imaging and pro-
vides the nuance needed to understand the principle of edge detection methods. This
ISBN :978-81-945631-7-4
93
analysis outlined the various methodologies that employ efficient IH thermography an-
alytical techniques for extremities perception that is currently being reviewed and im-
plemented in specific science fields, checked their feasibility and utility, and proposed
that depending upon the application areas of IH illustrations, the precision of different
operators changes. Henceforth we need to study more about laplacian filters as they can
deliver promising results too. Present development in IH imaging systems is also sug-
gested here. For the future, we are preparing to integrate several approaches and to
adjust their respective thresholds to reduce the fallacies.
REFRENCES
ISBN :978-81-945631-7-4
94
[6]Kunal J Pithadiya”Combination of thresholding and Log Edge Detection Technique
in Thermal Image Analysis”.
[7] Mohammad S. Alam, senior member IEEE, John G. Bognar, Russell C. Hardie,
Brian J. Yasuda: “Infrared Image Registration and High Resolution Reconstruction Us-
ing Multiple Translationally Shifted Aliased Video Frames.
[8] MrityunjayRai, TanmoyMaity, R.K. Yadav: “Therma imaging system and its real
time application: a survey”
[9] RamanMaini, Dr.HimanshuAgrawal :”Study and Comparison of Various Image
Edge Detection Techniques”.
[10].Shazia Shaikh,Ramesh Manza,Nazneen Akhter:”Current Trends in the Applica-
tion of Thermal Imaging in Medical Condition Analysis”
[11] SK Katiyar, PV Arun :” Comparative analysis of common edge detection tech-
niques in context of object extraction”.
[12] Xiaohui Chen, GuangtaoZhai, Jiawang, Chunjia Hu, YuanchunChen:”Color
Guided Thermal Image Super Resolution”
ISBN :978-81-945631-7-4
95
Scope of BIM Application forMunicipalSolid Waste
Management
gaurav.narlawar@walchandsangli.ac.in
pratap.sonavane@walchandsangli.ac.in
1 Introduction
ISBN :978-81-945631-7-4
96
struction and operation. It improves collaboration among stakeholders, document
projects, and reduces the time required to achieve more predictable project results.
One can use the BIM model to view the entire project life cycle. BIM model consist
of computer models that comprise of lines, points, and geometric objects. These ob-
jects carry all the information associated with the project and can be used and modi-
fied all through the project life cycle. They include their physical and practical fea-
tures along with project life-cycle data, from initial concept design to construction,
and finally through facility operation and maintenance.Recently, the researchersare
concentrating on BIM applications in different sectors.
ISBN :978-81-945631-7-4
97
2.2 Different BIM Dimensions
The dimensions of BIM can be categorized from BIM 3D to BIM 8D based on data-
base content.
▪ BIM 6D [Sustainability]
A 6D BIM helps executeenergy demand analyses with compatible software for da-
ta integration associated with energy consumption or environment protection. The
application of BIM 6D technology can contributetoincreasingly fair and correct ener-
gy estimations early in the planningstage. BIM 6D Models are frequently used as a
prime means to satisfy requirements specified by Leadership in Energy and Environ-
mental Design (LEED) andBuilding Research Establishment Environmental Assess-
ment Methodology (BREEAM)[1].
ISBN :978-81-945631-7-4
98
information of every specific element such as building, finish, equipment, etc. should
be added in the database. The related information of the facility operation and
maintenance are item type, item specification, replacement or next maintenance time,
period of warranty, etc. 7D-BIM allows you to suitably maintain the building and in
case of failure, it can urgently find and repair items[1].
▪ BIM 8D [Safety]
An 8D BIM takes safety into account i.e. how well the structure can deal in the
event of a natural or man-made disaster, the essential safety measures and damage
minimization plans. 8D BIM might include fire exits, evacuation plans, escape routes,
etc. By reviewing and removing risk factors, 8D BIM can be adopted to prevent dan-
gers in the area under construction.
3 Literature Review
The literatures of BIM by several researchers are discussed evaluating thescope for
introductionof BIM in the areaof MSWM as follows.
ISBN :978-81-945631-7-4
99
BIM knowledge base by offering detailed description and categorization of ad-
vantages, risks andchallenges of BIM and prioritizing advantages of BIM with respect
to time, cost and sustainability along with risks and challenges of BIM.
The current upsurge of the construction industry has been encouraging a significant
increase in BIM implementations focused primarily on planning and develop-
ment.Bryde et al. [9]explored the extent of BIM application with reported benefits to
the construction projects developed with BIM. It was evaluated that the most of-
tenobservedadvantage associated with the reduction of cost, monitoring throughout
the life cycle of the project and potential time savings.Migilinskas et al.
[10]contemplated the phases and patterns in the advancement of BIM frameworkand
made recommendations for future BIM applications. It was found that BIM expertise
and applications are emergingrapidly.There is a necessity to ensure an acceptable
standard of compliance and optimization of functional activities for project associates
and participants for a more satisfactory implementation of BIM.
The adoption of BIM frameworks for the process of operation and inspections has
not been so broadened.Shou et al. [11]explored the level of extent of BIM implemen-
tation thriven in building and infrastructure industries. It illustrated support for new
BIM use, improved conventional project management and project delivery process
transformation.Guillen et al. [12]introduced the implementation of BIM frameworks
as a critical component to facilitate successful enactment of the asset management
information system. It was concluded that BIM benefits for asset management are not
ISBN :978-81-945631-7-4
100
well characterized. It perceived the requisite of the knowledge extension on asset
management endorsed with the BIM framework as the basis for an information sys-
tem for asset management.
BIM can control construction and demolition waste efficiently by minimizing diffi-
cultiesthrough design alterations and modifications to improve building design and
building processes.Liu et al. [13]checked a unified platform to design decision-
making on waste, by supplying well-versed information of the model-oriented build-
ing to report the causes of waste throughout the design stages. They reported that the
BIM use in the projects is significant to ensure high design quality and to gain infor-
mation on the positive effects of the operations on the development of construction
waste on the site.Won and Cheng [14] identified BIM's potential opportunities for
effective construction and demolition waste management and reduction during the
preparation, designing, construction and dismantlingstages of construction projects.
As BIM-based approach focuses on changes in the process involving various types of
project members, the disposal of construction and demolition waste requires definite
cooperation among members based on enhanced communication between project
members. BIM-based process maps contain information about people involved in the
construction and demolition management process, as well as information that need to
be created and exchanged among project members.Kim et al.[15]mentioned a para-
digm based on the BIM that evaluates demolition waste in the initial stages of design
to attain efficient and optimized scheduling, supervision, and management. They de-
veloped a framework for assessing the quantity and categories of demolition waste-
formed during the building’s demolition phase with BIM, start from design phase and
governed by define standards of the country. The study assist as an assessment tool
for the demolition waste in the demolition stage and offer tools for calculating demo-
lition waste disposal fees, pickup ratings, recycling process and environmental impact
assessments with addition of correction factors.
ISBN :978-81-945631-7-4
101
status and barriers of MSWM in India. The prime parameters of MSWM along with
anall-inclusiveappraisal of MSWproduction, its characterization, collection and man-
agement as performed in India were evaluated. It was concluded that the construction
of decentralized waste processing systems in urbanitemetropolises or townships and
the innovation of the organized recyclingsector is required in developing countries
like India.Sharma and Jain [18] overviewed the generation, composition and treat-
ment of MSW in India.It was observed that in 2015, metropolitanregions of Indiapro-
ducedMSW which is around 62 MT.Almost 82 percent of MSWwaspicked upand the
residual 18 percent was dumbed. Only 28% of the waste picked up was treated and
the remaining 72% was exposed to dumps.It was concluded that rapidcivicdevelop-
ment, tradeexpansion, expandingpopulation and monetarygrowth have caused a sub-
stantialincrease in production of waste in India. In India, MSWMsys-
temappearsincompatiblebecause ofthedependence on insufficient waste services, un-
organizedprovince and opendumping of waste. In order to manage foremostproblems
associated with waste management, effective waste policies, appropriatetech-
nicaldevelopments and adequacy of skilledpersons are necessitated.
The researchers of emergentrepublicsrequire to encourage evolvinginventive and
demandingadvance investigation projects to promotepracticable, operative and envi-
ronmental solid waste management methods. Priti and Mandal [19]reviewed practic-
es, challenges and policy implications in the evolution of MSWM in India. The com-
position of MSW was found massively influenced i.e. 45 to 50 percent with organic
waste, posing a technology adoption challenge. It was summarized that India requires
to develop and build a well-organizedMSWM system with adequate incentive pro-
grams and provisions on business model that are both socially acceptable and sustain-
able. Das et al. [20]overviewed a wide range of existing solid waste management
strategies such as composting approaches, energy recovery technologies which in-
cludes thermo-chemical conversion and bio-chemical conversion. It described various
innovative solutions reported in many nations for accomplishing smart and resilient
waste management policies. The research revealed that an enhanced approach to the
convergence of societal, financial, administrative, legal, technological and ecological
aspects necessitate for an effective solid wastemanagement. Thetopographicalloca-
tions and financialposition of countriesare crucial factors in regulating the properties
of waste. It was concluded that the performance for solid waste management mecha-
nisms must be assessed on the basis of their long-term economic viability which
would make it easier for managers to manage the ever-increasing size of solid waste
in a more flexible manner.
4 Conclusion
The literature assessment reveals that several researchers have made all-
embracinginvestigation on BIM implementationin various areas such as construction
project management, extraction of features, system modelling, economic sys-
tem,construction waste management, etc.BIM provides benefits to construction con-
tributors including the improved efficiency with BIM coordination, fundamental
ISBN :978-81-945631-7-4
102
model frameworks, simulation, budget estimating, clashes identification, schedule
tracking, planning, sustainability analytics, quantitative energy analysis, productivity
optimization, significantly improved technologies, fast delivery of projects, improved
client support, earlier error mitigation in design phase andupgraded safety measures.
Inclusively BIM supports for minimizing man hours in quantity takeoff, increasing
efficiency, forecasting imminent issues, early decision making, etc.Accordingly, there
entailfurtherresearchon BIMimplementation inMSWM.
References
ISBN :978-81-945631-7-4
103
49, no. 28,pp. 191–196, 2016.
[13] Z. Liu, M. Osmani, P. Demian, A. Baldwin, “A BIM-aided construction waste
minimisation framework” Automation in Construction, vol. 59, pp. 1–23,
2015.
[14] J. Won and J. Cheng, “Identifying potential opportunities of building
information modeling for construction and demolition waste management and
minimization” Automation in Construction, vol. 79, pp. 3–18, 2017.
[15] Y. Kim, W. Hong, J. Park, and G. Cha, “An estimation framework for
building information modeling (BIM) -based demolition waste by type,”
Waste Management & Research, pp. 1–11,2017.
[16] V. Srivastava and S. Ahmed, “Urban solid waste management in the
developing world with emphasis on India : challenges and opportunities,” Rev
Environ Sci Biotechnol, 2014.
[17] R. Joshi and S. Ahmed, “Status and challenges of municipal solid waste
management in India : A review,” Cogent Environ. Sci., vol. 28, no. 1, pp. 1–
18, 2016.
[18] K. Sharmaand S. Jain, “Overview of Municipal Solid Waste Generation,
Composition, and Management in India,” J. Environ. Eng., vol. 145, no. 3,
2019.
[19] Pritiand K. Mandal, “Review on evolution of municipal solid waste
management in India : practices, challenges and policy implications,” J.
Mater. Cycles Waste Manag., 2019.
[20] S. Das, S. Lee, P. Kumar, K. Kim, S. Soo, S. Sundarand S. Bhattacharya,
“Solid waste management : Scope and the challenge of sustainability,” J.
Clean. Prod., vol. 228, pp. 658–678, 2019.
ISBN :978-81-945631-7-4
104
Optimization of Compound Casting through Simulation
Software: A Review
Abstract. In this paper the information about the use of casting simulation used
to optimize compound casting process is presented. There are different stages of
casting simulation process helps to modify casting design and optimize process
parameters in new casting product development. Different modules of casting
simulation program give a possible prediction of defects and their location. As
the number of steps increases in process, the number of defects increases. Due to
the many steps present in the casting process, industries may suffer from poor
quality and poor productivity Compound casting is casting made up of multi-
material helps to produce weightless component and low cost of the component.
In compound casting, two or more similar or dissimilar materials are cast
together. In two material compound casting, a material having a high melting
point is used as insert and material having a low melting point is cast around
insert material. Compound casting produces parts required for automobile,
shipping, aviation industries.
Keywords: Casting simulation, Multi material casting, Visualization of mold filling and
solidification.
1 Introduction
Metal casting is one of the most important manufacturing process used to make various
parts in aeronautics, automobile, military, naval industries. Up to date, it is not possible
to make defect-free castings. There are following steps in casting process for pattern
making, sand mould and core making, metal melting, metal pouring, solidification,
casting and separation, removal of gating systems. As the number of steps in casting
process increases, number of defects increases.
Casting simulation means the process of imitating casting phenomena with the help of
the mathematical model in the computer program. Casting simulation shows mould
filling, solidification with different colour coding, defects and its optimization. By
method optimization and casting simulation, it is possible to produce quality casting
ISBN :978-81-945631-7-4
105
with better yield. It helps to increase productivity by reducing shop-floor trials. The
complex shape of the casting can be performed after its simulation and defects and
material loss can be reduced. It adds value to the product. With the help of casting
simulation, it is easy to store the results of each trail virtually and reviewed months later
for similar projects [6].
compound casting can be made by casting of two similar or dissimilar materials one is
in solid-state as insert and one as liquid state as matrix takes place. Compound casting
helps to make the part for lightweight applications. Compound casting also helps to
achieve the required amount of properties by reducing cost [7][8].
2 Literature Review
B. Ravi [1] gives detailed information about mould filling, solidification of molten
metal, shrinkage detection. Metal casting phenomena is compared with the volcanic
flow and sea-wave splashing. The information consists of three major factors affecting
metal casting: Geometry, materials and process. Input for simulation is a 3D CAD
model with various allowances, moulding cores, process parameters, feed aids and
feeders. The output of simulation are mould filling visualization, solidification with
different temperature ranges, filling time, mould erosion, incomplete filling of mould
cavity. The casting can be modified by changing part orientation and mould layout,
changing the size and position of the gating system.
B. Ravi [2] gives guidelines of the best implementation of simulation technology for
the casting industry. Simulation is done for three reasons: Enhancement of quality of
casting, Improvement of yield and rapid development. The defects related to improper
filling and solidification of the cavity, shrinkage defects, defects related to cooling
stress can be calculated accurately by simulation technology. The casting simulation
technique contains following five stages: Date gathering, Methods design, Simulation,
Optimization and project closure.
Hajjari et. Al [3] stated appropriate use of compound casting for lightweight Al/Mg
couple production. In compound casting one metal is cast around insert of another
metal. Interferential microstructure as well as shear strength at the joint were studied.
Shear strength depends on interference thickness and it increases as a decrease in the
interference thickness. If aluminium is cast around magnesium inserts, it produces an
oxide layer at the interface causes a reduction in strength. After casting, from bottom
to top interference thickness of materials decreases due to decreases in the hydrostatic
pressure. The bottom part of casting shows brittle fracture failure and top part shows a
ductile fracture in a shear strength test.
Oliver et.al [4] studied intermetallic bond characteristics of the titanium insert and
aluminium matrix. The pushout test gives shear stress and circular bending test gives
flexural strength. Mechanical properties are studied by analyzing the metallographic
characteristics and FEM analysis at elastic state. The mechanical properties of the com-
pound casting can be improved by formation of chemical interaction layer. Failure due
to crack propagation takes place from bottom to top and matrix yielding takes place
from top to bottom.
ISBN :978-81-945631-7-4
106
M Divandhari et.al [5] performed an experiments of compound casting of aluminum
matrix and copper inserts by lost foam casting method. Copper inserts shows a good
wettability with aluminium and create a strong metallurgical bond. A microstructural
investigation is carried by dispersive X-ray and SEM technique. The wire affected zone
contain composition affected zone where melt starts to dissolve the wire and cooling
affected zone where cooling of the wire takes place due to precipitate of the first stage
of solidification.
K. Papis et.al [6] gives information about interface formation in the compound casting
of magnesium matrix and magnesium inserts. Hydroxide layer creates problem in the
metallurgical joining of magnesium and it can be avoided by the surface coating as a
pretreatment. The coating increases the wetting properties of cast materials. Shrinkage
cavity present at interface prevented by making appropriate solidification.
Ahmet Avci et.al [7] improved microstructural and mechanical properties of a low
carbon steel plated reinforced by gray cast iron. By increasing volume fraction, ductility
property of gray cast iron can be improved. As normalization temperature increases,
the flexural strength of compound casting increases. The flexural modulus property of
cast iron can be increased by reinforcing with steel plate.
M. Kro et.al [8] stated improvements in the formation of the interface in aluminium-
aluminium compound casting. For generation of defect less surface, some pretreatments
and Zn coating is done on aluminium inserts. Microhardness increases at the interface
if Zn coating is used.
3 Casting Simulation
Casting simulation means experimenting the real casting process with the help of math-
ematical model by the computer program. Programming of casting simulation can be
done by using finite difference method, finite volume method, finite element method
and vector element method. Fig. 1 shows benefits and concern of computer program to
manufacturing industries.
ISBN :978-81-945631-7-4
107
3.1 Need of Casting Simulation
a. There are many steps included in the casting process which leads to more error
in the casting process.
b. Casting simulation helps in visualization of mould filling, solidification,
defects formation without actually performing of casting.
c. With the help of casting simulation, quality is improved by minimizing casting
defects.
d. Casting simulation helps in optimizing the gating system and improves the
yield of the casting.
e. Casting simulation minimizes trials in new casting development by making a
prototype and reduces the rejection rate.
Casting simulation has direct and indirect benefits. The direct benefit provides cost
reduction and indirect benefits provide value addition.
Quality and Yield Improvement: With the help of casting simulation, the optimum
gating system can be obtained, provides good quality casting and improves the yield of
casting. Improper design can be visualized by casting simulation technique and it is
analyzed for various observations. Small changes in the runner, riser provides a large
effect in defects reduction. Casting simulation helps to reduce inspection cost of the
casting [1].
Shop Floor Trials Reduction: Traditional casting method contains many steps in the
casting process like modification in existing casting, melting of the molten metal, pour-
ing of metal, inspection. Small modification in tools are required for casting requires
more cost. Some materials are costly in making a casting. Casting simulation reduces
that cost and provides solution without actually performing casting. Casting simulation
reduces the cost of reusability of trial components by providing the same results. The
Casting Simulation also reduces time required for casting [1].
Value Addition: Casting simulation helps to provide complex shape casting by opti-
mizing process parameters and reducing defects. Documentation of casting design and
modification can be done by a computer simulation program. Non-destructive test for
calculating internal defects takes higher cost. By using casting simulation it is possible
to find out internal defects, so it is a cost-effective method to find out defects. High
quality casting increases the goodwill of the casing [1].
Knowledge Management: Casting simulation helps to preserve input data required for
casting, results of casting simulation, modification in casting and can be reused for new
similar projects. Casting simulation helps in enhancing knowledge by the management
of available data and modifications [1].
ISBN :978-81-945631-7-4
108
3.3 Stages of Casting Simulation
The steps require for casting simulation are Data gathering, method design, numerical
simulation, method optimization and project closure.
Data Gathering: It is a first and most important step in casting simulation. Data col-
lected for casting simulation must be realistic and accurate. First 3D CAD model is
made of the part to be cast. then it is converted into STL format. After extracting STL
model in simulation software material properties are decided. Mould and core proper-
ties are selected for the casting part. New modifications related to the parting line, gat-
ing system, cores, feeders are decided in this stage [2].
Method Design: In this step, feeders, gating system, cores and feed-aids are added to
the 3D model in order to make cast part model. Number of iterations are taken for
simulations to make the defect less and optimized design. The Corrections required in
the design are done in this stage [2].
Numerical Simulation: It is the most important step in casting simulation process. here
FEM mesh is created and optimum elemental size is selected. Boundary conditions and
various coefficients in the simulation are decided in this step. Simulation results depend
on mould filling, solidification, cooling, stress concentration in casting. Data related to
results are presented in colour coding format in the post-processing module [2].
Project Closure: After optimizing casting design and eliminating defects, all data is
documented carefully. Data contain images of various colour coded results, analysis
report and method report. All input and output data is stored in folder and backup folder.
Stored data can be used for future modification [2].
Casting Problem Identification: Traditional casting provides casting with various de-
fects at various levels and it provides poor yield in casting. The casting process is
simulated provides better control of process parameters on process. Casting simulation
helps to identify location of defects in casting and helps in designing of riser and gating
system to reduce defects.
ISBN :978-81-945631-7-4
109
Method Optimization: Traditional casting method for innovation for new products
requires a large number of shop-floor trials. Casting simulation helps to reduce shop
floor trials by proper method design with help of computer program. The small im-
provement in casting design leads large impact on use of energy utilized, material and
labour required for the casting process.
Managerial and Technical Support: For deciding technical inputs and outputs, labors
having sound domain knowledge are required. Quality of casting totally depends on the
interpretation of the method for casting simulation, it requires good design and quality
engineers. To solve simulation related issues, sound knowledge of the finite element
method is required [9].
Solid Modelling: Some firms are not reluctant to provide casting model CAD design
to casting industries due to security reasons. They provide 2D drawings rather than 3D
design. So casting industries to convert the 2D drawing to 3D design through local
designers. It will create errors in casting drawing and this error is not analysed till final
component inspection takes place [9].
4 Compound Casting
Compound casting process is a process in which more than two similar or dissimilar
materials are simultaneously cast together. In two material compound casting, a mate-
rial having high melting temperature is used as insert and low melting temperature ma-
terial is cast around insert material.
Detail Study of Part to be Cast: Detail study of the part to be manufactured is done
by performing various experiments. The part is studied for various stresses, temperature
and dynamic behavior in various situations.
ISBN :978-81-945631-7-4
110
Part Design and Material Selection: After the calculation of various stress and tem-
perature calculation, the part is modified to make the optimized design. Materials are
selected as per the requirement of design. Material is selected by taking consideration
of cost, thermal, mechanical and bonding properties.
Simulation for Bonding of Different Materials: Simulation is done for checking the
bonding strength of different materials. Heat transfer in terms of conduction and con-
vection is calculated and surface properties are determined as per requirements for
sound bonding [3].
Removal of Oxide Layer: While joining of different materials, the oxide layer is
formed at the interface of different materials. oxide layer prevents bonding between
materials. To avoid the oxide layer, the coating of zinc is done on the insert surface [6].
Casting Process: After application of coating, pouring of matrix material is done. Cast-
ing can be done by various types like LFC casting, sand casting, die casting [5]. For-
mation of different phases can be controlled by using a controlled temperature environ-
ment. After pouring metal, solidification is done as per requirements of final properties
by quenching or slow cooling. After casting process heat treatment can also produce
improved properties in compound casting [8].
Testing and Inspection : After casting of part takes place, then the part is transferred
for inspection. Inspection of the first component is done for destructive and non-de-
structive tests. If the final component is as per requirement then no need to do an in-
spection of remaining parts [4][7].
ISBN :978-81-945631-7-4
111
oxide layer is formed and it must be removed before solidification to make
good metallurgical bond.
5 Acknowledgement
References
1. B. Ravi, Casting Simulation and Optimization: Benefits, Bottlenecks, Indian Foundry Jour-
nal, 3-5, 2008.
2. B. Ravi, Casting Simulation- Best Practices, Transactions of 58th Indian Foundry Congress,
Ahmadabad, 1-6, 2010.
3. E. Hajjari ,M. Divandari ,S. Razavi, S. Emami, T. Homma and S. Kamado, Dissimilar join-
ing of Al/Mg light metals by compound casting process, Journal of Material Science ,46,
6491–6499, 2011.
4. O. Dezellus , L. Milani , F. Bosselet, M. Sacerdote-Peronnet, D. Rouby and H. Jain Mechan-
ical testing of titanium/aluminium–silicon interfaces by push-out, Journals of Material Sci-
ence,43, 1749-1756, 2008.
5. M. Divandari and A. Golpayegani, Study of Al/Cu rich phases formed in A356 alloy by
inserting Cu wire in pattern in LFC process, Materials and Design ,30 ,3279-3285, 2009.
6. K. Papis, J. Loffler and P. Uggowitzer, Interface formation between liquid and solid Mg
alloys-An approach to continuously metallurgic joining of magnesium parts, Materials Sci-
ence and Engineering A,527, 2274–2279, 2010.
7. A. Avcı , N. Ilkayaa, S. Mehmet and A. Akdemira, Mechanical and microstructural proper-
ties of low-carbon steel-plate-reinforced gray cast iron, Journal of materials processing tech-
nology, 209, 1410–1416, 2009.
8. M. Kro , T. Tanski1, P. Snopinski1 and B. Tomiczek1, Optimization of Mechanical Proper-
ties of Al–Al‐Compound Castings by Adapted Heat Treatment, Advanced Engineering Ma-
terials, 20, 1-10, 2018.
9. S. Siddalingswami, and S. Dulange, Advanced Techniques in Casting Defects and Rejection
Analysis: A Study in an Industry, International Journal of Innovations in Engineering Re-
search and Technology, 2,1-9, 2015.
ISBN :978-81-945631-7-4
112
A REVIEW ARTICLE OF LOW POWER
CONSUMPTION HETEROGENEOUS ROUTING
PROTOCOL IN WSN
1Prati040196@gmail.com
2cecil.kanchan@gmail.com
1 Introduction
A Wireless sensor arrange comprises of tens to thousands of sensor hubs that are thickly
sent in a sensor field and have the capacity to accumulate information and course data
back to base station [1-5]. Presently days, Wireless Sensor Network is utilized in a few
application, for example, recognizing and following soldiers, tanks on a battleground,
process traffic stream on streets, register stickiness and different angles in fields, fol-
lowing work force in structures. A sensor hub incorporates detecting unit, power unit,
and handling unit. Remote Sensor Networks attributes are as per the following:
a) Dynamic system topology
b) Power requirement.
c) Do not have worldwide ID.
d) Heterogeneous hubs.
ISBN :978-81-945631-7-4
113
e) Nodes are inclined to disappointments.
Remote sensor organize is a system that comprises of little, unpredictable & huge num-
ber of sensors and at any rate one base station or sink hub. Most testing issue in remote
sensor arrange is the restricted battery intensity of sensor hubs utilized in the system.
To expand the vitality of sensor hubs, vitality is ideally administered all through the
remote sensor organize. So the way to improve the existence time of the system is to
plan compelling and vitality mindful conventions. Steering convention can be organize
structure based or convention activity based. Right now, instructional exercise of exist-
ing directing conventions in remote sensor systems is done. Testing issues for WSNs
are Energy utilization and system life time. In the accompanying segments which are
depicted beneath, we present different existing directing conventions with their benefits
& negative marks.
At first WSNs was chiefly spurred by military applications for combat zone observa-
tions. Regular citizen application area of remote sensor systems have been viewed as
later on, for example, ecological, social insurance and creation , brilliant home & so on.
To meet this expansion, the accompanying huge structure issues of the sensor arrange
must be thought of:
• Operating Environment: Sensor hubs might be sent in any condition conditions.
• Power Consumption: Sensor hubs are outfitted with restricted battery lifetime.
• Data conveyance models: Data conveyance models decide when
• Network Dynamics: Sensor hubs are further versatile and in this way sensor arrange
isn't static.
3 Literature Review
Most sensor systems are application explicit & have diverse application necessities. In
this manner, all or part of the accompanying principle structure goals is considered in
the plan of sensor systems:
Little hub size: Since sensor hubs are normally conveyed in a cruel or antagonistic
condition in huge numbers, decreasing hub size can encourage hub organization. It will
likewise lessen the force utilization & cost of sensor hubs.
Low hub cost: Since sensor hubs are generally sent in a brutal or unfriendly condition
in enormous numbers and can't be reused, diminishing expense of sensor hubs is sig-
nificant and will result into the cost decrease of entire system [6-10].
ISBN :978-81-945631-7-4
114
4 Literature Review
The Smart Detect Project Team, Indian Institute of Science, Bangalore, India; ―Wireless
Sensor Networks for Human Intruder Detection‖ Report, May 2010 . In this paper we re-
port on the results of an exploration & showing venture on human interruption discov-
ery in an enormous secure space utilizing an impromptu remote sensor arrange. In the
paper they report on the particular building arrangement that was built up: the different
compositional decisions & the related explicit structures. Notwithstanding building up
an evident framework, the different issues that emerged have offered ascend to a lot of
fundamental research in territories, for example, land parcel directing, dispersed factual
discovery, sensors and related circuits, a low power versatile smaller scale radio, and
power upgrading implanted frameworks programming.
Tian He, Sudha Krishnamurthy, John A. Stankovic, etc. ―VigilNet: An Integrated Sensor
Network System for Energy-Efficient Surveillance‖. This paper depicts one of the signif-
icant endeavors in the sensor arrange network to construct an incorporated sensor or-
ganize framework for observation missions. The focal point of this exertion is to obtain
and confirm data about adversary abilities and places of threatening targets. Such mis-
sions frequently include a high component of hazard for human faculty and require a
high level of stealthiest. Consequently, the capacity to convey unmanned reconnais-
sance missions, by utilizing remote sensor systems, is of extraordinary pragmatic sig-
nificance for the military.
G.J. Pottie and W.J. Kaiser, ―Wireless Integrated Network Sensors‖, Communications of
the ACM, 2000. Remote incorporated system sensors (WINS) give dispersed system and
Internet access to sensors, controls, and processors profoundly inserted in hardware,
offices, & the earth. The WINS arrange speaks to another checking and control capacity
for applications in such enterprises as transportation, fabricating, social insurance, nat-
ural oversight, and wellbeing and security.
Ruchi Mittal, M.P.S Bhatia, ―Wireless Sensor Networks for Monitoring the Environmen-
tal Activities‖. The creators present Wireless sensor arrange which when joined with
different territories at that point assumes a significant job in examining the information
ISBN :978-81-945631-7-4
115
of woods temperature, bioinformatics, water pollution, traffic control, media transmis-
sion & so forth. Because of the headway in the territory of remote sensor arrange &
their capacity to produce enormous measure of spatial / transient information, draw in
specialists for applying information mining systems & getting intriguing outcomes. En-
thusiasm for remote sensor organizes in checking the natural exercises is developing
and this is drawing in analysts for discovering the examples from huge measure of spa-
tial / worldly data sets.
Krishan Kumar, Ms. Shruti Goel, “Literature Review to Optimize the Energy Consump-
tion in Wireless Sensor Network” This paper centers around the model to lessen battery
overhead and improve the lifetime of a remote sensor arrange, utilizing the idea of Ep-
idemic Model. The observing of the system is finished by an extraordinary hub that
uses a similar convention for correspondence and monitors the condition of the hubs as
it is spread. It tends to be utilized based on their positions, persistent detecting, occasion
discovery, area detecting and so forth. It will be accomplished as far as numerical ex-
amination. The writing is helpful to discover approaches to diminish the battery over-
head and upgrading the lifetime of a remote sensor organize.
ISBN :978-81-945631-7-4
116
Ogundile OO, Alfa AS, “A Survey on an Energy-Efficient and Energy-Balanced
Routing Protocol for Wireless Sensor Networks.” Wireless sensor systems (WSNs)
structure a significant piece of modern application. There has been developing enthu-
siasm for the potential utilization of WSNs in applications, for example, condition
checking, debacle the executives, human services observing, knowledge observation
and resistance surveillance. In these applications, the sensor hubs (SNs) are conceived
to be sent in sizeable numbers in a remote region, and it is very hard to supplant these
SNs after complete organization in numerous situations. Hence, as SNs are transcend-
ently battery controlled gadgets, the vitality utilization of the hubs must be appropri-
ately overseen so as to delay the system lifetime and usefulness to a sane time.
D Laxma Reddy ; V Aran ; A V Paramkusam ; N Nagaraju, “Wireless sensor net-
works algorithms to improve energy efficiency” These papers proposed to reason the
vitality exhaust and to improve the existence snapshot of the arrangement of associa-
tions in Wireless sensor organize (WSN). The information convene by every sensor is
communicated over the framework to one procedure centermost that uses all imparted
information to see singular setting or discover an event. The message voyaging tech-
nique ought to be planned to chop down the confined vitality ability of the sensors.
Bunch sensors assembled enthusiastic about groups, all together that sensors be in con-
tact data just to group heads so the bunch heads trade the aggregate information to the
procedure focus, could spare vitality.
Noor Zaman, Low Tang Jung, and Muhammad Mehboob Yasin, “Enhancing En-
ergy Efficiency of Wireless Sensor Network through the Design of Energy Efficient
Routing Protocol” Wireless Sensor Network (WSN) is known to be a profoundly asset
obliged class of system where vitality utilization is one of the prime concerns. In this
exploration, a cross layer plan system was embraced to structure a vitality effective
steering convention entitled "Position Responsive Routing Protocol" (PRRP). PRRP is
intended to limit vitality expended in every hub by (1) decreasing the measure of time
in which a sensor hub is in an inert listening state and (2) diminishing the normal cor-
respondence separation over the system.
ISBN :978-81-945631-7-4
117
unwavering quality, the chief concern is limiting vitality utilization and augmenting
system lifetime while planning conventions and applications. In this paper, we survey
the principle configuration issues dependent on the model of remote sensor systems:
sans structure and organized for information assortment and conglomeration where job
of bunching and directing is talked about for vitality protection and improving system
lifetime. These plan procedures are the establishment of any systems administration
convention from the vitality sparing perspective. A thorough unthinkable outline of
various methodologies under sans structure and organized remote sensor systems for
information assortment and collection, bunching and steering is given key issues.
Moiz Chasmai, Rajiv Das, etc. ―Wireless Sensor Network for snow-met data
monitoring in Indian Himalayas - A Review‖ Report- Snow and Avalanche Study
Establishment. Torrential slide estimate requires information assortment of day off
meteorological parameters on regular schedule from the out of reach regions in the
Himalayas during winter. To gather such information the SASE has introduced number
of AWS and RRTS which measure different snow met parameters, for example, en-
compassing temperature, relative dampness, air pressure, snow surface temperature,
wind speed/bearing, and so forth and transmit the information to a Central Station.
WSN is by all accounts a potential answer for the specific use of nonstop snow-met
information obtaining in the Himalayas on the grounds that WSN has the ability to
conquer the confinements of the current systems by decreasing the endeavors and co-
ordinations for setting up the system, expanding the territory of perception and dimin-
ishing endeavors in support by highlighting specially appointed systems administration
capacity [5,6].
ISBN :978-81-945631-7-4
118
5 Comparison between different energy efficient protocol table
Fig.1 appears for examination between steering conventions like as a LEACH, TEEN,
DEEC, SEP concerning different rounds. Consequently this chart is speaking to of
higher PDR in SEP directing convention 3.5x104 then other. Presently various steering
conventions are being utilized to build the vitality productivity of the system, with two
particular kinds of conventions, homogenous and heterogeneous. In these two conven-
tions, the SEP (Stable Election Protocol) is one of the best heterogeneous conventions
which increment the strength of the system. Right now, propose a moving toward the
εFCM calculation in bunching the SEP convention which makes the WSN arrange more
vitality effective. The reproduction results demonstrated that the SEP-εFCM proposed
convention performed superior to the ordinary SEP convention.
ISBN :978-81-945631-7-4
119
5.2 Energy Based comparison:
Fig.2 shows a Dead Nodes Versus Time for different convention. SEP is perform lower
number of round as contrast with other Unlike [5], we don't require any worldwide
information on vitality at each political race round. Not at all like [4, 8], SEP is dynamic
in that we don't expect any earlier conveyance of the various degrees of vitality in the
sensor hubs. Besides, our examination of SEP isn't just asymptotic, for example the
investigation applies similarly well to little estimated systems.
Table 1. Comparison of LEACH-C, TEEN, DEEC and SEP in terms of nodes alive
Table 1. this table show SEP (Stable Election Protocol) so every sensor node in a het-
erogeneous two-level hierarchical network independently elects itself as a cluster head
based on its initial energy relative to that of other nodes [10-12].
ISBN :978-81-945631-7-4
120
6 Conclusion and Future Research
One of the primary difficulties in the structure of directing conventions for WSNs is
vitality proficiency because of the rare vitality assets of sensors. A definitive goal be-
hind the directing convention configuration is to keep the sensors working for whatever
length of time that conceivable, subsequently broadening the system lifetime. The vi-
tality utilization of the sensors is commanded by information transmission and gather-
ing. In this way, directing conventions intended for WSNs ought to be as vitality effec-
tive as conceivable to draw out the lifetime of individual sensors, and consequently the
system lifetime.
Right now, have studied an example of steering conventions by considering a few
order criteria, including area data, organize layering and in-arrange handling, infor-
mation centricity, way repetition, arrange elements, QoS prerequisites, and system het-
erogeneity. For every one of these classifications, we have talked about a couple of
model conventions. Two significant related research bearings ought to get considera-
tion from the analyst specifically the structure of steering conventions for obligation
cycled WSNs, and three-dimensional (3D) sensor fields when planning such conven-
tions. Albeit a large portion of research take a shot at WSNs, specifically, on steering,
considered two-dimensional (2D) settings, where sensors are conveyed on a planar
field, there are a few circumstances where the 2D supposition that isn't sensible and the
utilization of a 3D configuration turns into a need[12].
References
[1] Fifi Farouk, Rawya Rizk and Fayez W. Zaki “Multi-level stable and energy-effi-
cient clustering protocol in heterogeneous wireless sensor networks,” IET Wireless
Sensor System, Volume Number. 4, Issue Number. 4, pp. 159–169, 2014.
[2] Arafat Abu Malluh, Khaled M. Elleithy, Zakariya Qawaqneh, Ramadhan J. Mstafa
and Adwan Alanazi, “EM-SEP: An Efficient Modified Stable Election Protocol,”
American Society for Engineering Education (ASEE Zone 1), Zone 1 Conference, pp
1-7, 2014
[3] Sandeep Verma and Kanika Sharma, “EEZECR: Energy Efficient Zone Divided
and Energy Balanced Clustering Routing Protocol in Wireless Sensor Network,” Cir-
cuits and Systems: An International Journal (CSIJ), Volume Number. 1, Issue Number.
1, 2014.
[4] Anitha, R.U, Kamalakkannan, P., "Enhanced cluster based routing protocol for mo-
bile nodes in wireless sensor network," Pattern Recognition, Informatics and Mobile
Engineering (PRIME), International Conference, pp.187, 2013.
ISBN :978-81-945631-7-4
121
[5] O. Rehman, N. Javaid, B. Manzoor, A. Hafeez, A. Iqbal and M. Ishfaq, “Energy
Consumption Rate based Stable Election Protocol (ECRSEP) for WSNs,” International
Workshop on Body Area Sensor Networks ELSEVIER, pp. 1–6, 2013.
[8] Dilip Kumar, “Performance analysis of energy efficient clustering protocols for
maximising lifetime of wireless sensor networks,” IET Wireless Senor. System, Vol. 4,
Iss. 1, pp. 9–16, 2012.
[9] Lutful Karim and Nidal Nasser, “Energy Efficient and Fault Tolerant Routing Pro-
tocol for Mobile Sensor Network,” Communications (ICC), 2011 IEEE International
Conference, pp. 1-5, Issue Number. 1550-3607, 2011
[10] Yun Zou, Huazhong Zhang and Xibei Jia, “Zone-Divided and Energy-Balanced
Clustering Routing Protocol For Wireless Sensor Networks,” Broadband Network and
Multimedia Technology (ICBNMT), 4th IEEE International Conference Pp. 112 – 117,
2011.
[11] Brahim Elbhiri, Saadane Rachid, Sanaa El fkihi and Driss Aboutajdine, “Devel-
oped Distributed Energy-Efficient Clustering (DDEEC) for heterogeneous wireless
sensor networks,” IEEE I/V Communications and Mobile Network (ISVC), 5th Inter-
national Symposium, 2011.
[12] Parul Saini and Ajay K Sharma, “Energy Efficient Scheme for Clustering Protocol
Prolonging the Lifetime of Heterogeneous Wireless Sensor Networks,” International
Journal of Computer Application, Volume 6– Issue No.2 2010.
ISBN :978-81-945631-7-4
122
Achieving CIA using Hierarchical access control: a
Review
1 Introduction
In such environment where multiple users are working together, problem of access con-
trol is very important topic. In such environment users are categorized in various dif-
ferent classes and arranged into hierarchical structure. All resources are also classified
into security classes. In this manner higher category user class has higher privileged
resources and lower category user class has lower privileged resources. And here a re-
source means data as well as program. Many researchers told about different access
control schemes in a hierarchical structure can be found in the studies on multilevel
databases security.
Why so much emphasis is given to information security because there is very huge
utilization of computers along with internet now a day. There are number of
ISBN :978-81-945631-7-4
123
conferences, workshops and journals dedicated to the security aspect of Hierarchical
access control system. In this, contribution by computer scientist cryptologist, mathe-
matician, engineers from electrical stream computer engineer and research scholar is
involved. However, these contributions often have very different views on the key Hi-
erarchal access control problem and their respective solution. This analysis shows that
people belonging to computer science, cryptology, computer engineering often seem to
have a less knowledge of the contribution made by researchers in other discipline. This
tends to two different inferences like first is we can see that marking security problem
actually require interdisciplinary efforts and second is that researchers of different dis-
cipline generally not try for reinvention. With such diversity in field of HAC, it is re-
markable to find that there is few research exercise in inter disciplinary research. Con-
tributions are only devoted to fields like cryptology, computer science and engineering,
information security. To make impression of the field, such analysis is necessary in
order to see broad picture and to see on what previous research work has emphasized
and determine those areas where the need of future work is needed most. Lack in the
detailed survey on HAC contribution it becomes necessary to study how and to what
amount this issue is covered by previous research. To accomplish this we need to
choose some conceptual tool from the past research that will help us to make sense of
and classify the exiting research work. These can be models for HAC and research path
adopted.
Specific conferences or journals are not sufficient in order to get more details of re-
search effort. This paper analysed the information security literature up to 2018. Some
considered studies are beyond the scope of analysis like ethical analysis. We cannot
consider these things into particular security issue of HAC. Second section of paper is
about analysis scheme for study of issues including security of resources and infor-
mation in hierarchical structure. In third section types of hierarchies are given. Fourth
section describes methodologies of key management. Fifth section is about types of
access control. In sixth section previous research is analyzed in tabular form on the
basis some criteria. Lastly a summary is there..
ISBN :978-81-945631-7-4
124
maintain confidentiality, integrity and availability.
Before concentrating on above four issues there are many possible other issues like
how to create and implement new policies and security guidelines, how and what to
manage, management of unwanted movement of control and information, management
of embedded kind of security, development of secure environment for programming,
how we manage secure programming language, how to solve problem of secure key
management and problem of trusted third party and certificate authorities how to man-
age customers viewpoint toward organization’s aims and policies.
While studying and analyzing these issues, we came to this conclusion that we can-
not cover all aspects of security with respect to HAC. There could be chances of biasing
that towards some subarea or towards some discipline. To get rid from this situation
we are not going to consider all aspects of these issues only abstraction for this focussed
on four above issues. These issues represent abstraction for all aspects of contribution
for the HAC. How should security of HAC is managed and how can we develop HAC
are the key issues regarding key generation and distribution.
Confidentiality, availability, integrity, and non repudiation are the security require-
ments connected with these issues. Confidentiality is detection and prevention of unau-
thorized access to information. Integrity is information should not be updated by unau-
thorized users. Designing of a secured hierarchical access control system includes re-
quirement such as representation and modelling of different security requirement, to
collect different security requirement and how to get surety that designed HAC accom-
modates the requirement. This paper includes all the analysis of various contributions
in tabular form so it is simple for discrimination of different work toward this domain
of hierarchical access control.
a. Linear type –In this type each element in hierarchy has only one direct prede-
cessor (up) and one direct successor (down).
b. Tree type –In this type elements can have many direct successor but one pre-
decessor
c. DAG type –In this type Directed Acyclic graph, in this elements have many
successor as well as many predecessor.
ISBN :978-81-945631-7-4
125
•Linear •DAG
•Tree
b. Unbalanced Hierarchy
In this hierarchy the leaf classes at some branches will be deeper than in the
other branches and every member is having parented from just immediate
above level.
c. Ragged Hierarchy
In this hierarchy, control of at least one security class will not be directly
under the control of a parent from the level immediately above, but from a
higher level which means that they come directly under the control of a super
senior.
A pyramid structure is the base for hierarchical organization. Except the super Boss
every employee in the organization, is subordinate to upper level. This structure is hav-
ing multiple entities which are arranged one below the other depending on their role.
Advantages-
• Employees is assigned and also identifies certain level of leadership, account-
ability and responsibility in that particular organization
• Motivation for benefits is also there in that organization likes opportunities for
promotion.
• Employees can have recognition as specialist in hierarchical structures. Since
depending on their role work field is getting specific and employee can be-
come expert.
• In this manner loyalty comes in employee toward their department and they
can do best in their areas.
Limitation-
ISBN :978-81-945631-7-4
126
A partially ordered relation is defined in the set SC as SCi ≥ SCj which means security
clearance of SCi is greater or equal to the SCj where SCi is ancestral class and SCj is
descendent class.
There are mainly three types of key management strategies to access hierarchy a)
centralized b) decentralized c) distributed.
a) Centralized
In centralized key management scheme in group researchers apply a single cen-
tral authority called key server and a hierarchical structure to manage keys during
key generation, distribution and key updating. It includes three main stages those
are 1) Key Generation 2) offline pre key distribution 3) revocation of authenticated
node 4) key distribution in secure manner 5) rekeying or update of keys [1] [2] [3]
[4] [5].
Harney and Muckenhirn [1] proposed that there is a group of n members and in
that group a group manager called key server which manages information of all
group members. It takes care of n number of keys which are shared and responsible
for group communication. Key distribution methods can be classified as paired keys,
hierarchical arrangement of keys, broadcast the key deriving information.
Moharrum, R. Mukkalamala, and M. Eltoweissy[2] proposed a new CKDS means
efficient and scalable combinatorial key distribution scheme for supporting secure
group communications. They used combinatorial exclusion based method for key
distribution.
A. Yilmaz, G. Noubir, G. Lin, and T. Kaya [3] proposed that multicast group
management protocol which is dynamic that provide the solution for the problem of
mobility un trusted links and multi hop communication cost. In this members partic-
ipate actively to support security and which is distributed among the members of
group.
Pietro, Mancini, Law, Etalle, and Havinga [5] proposed extended logical key hi-
erarchy and this LKH ensures security.
b) Decentralized
In decentralized group key management scheme total structure is divided into
subgroups. Subgroup can be call as clusters or classes. Sub group head or class con-
troller responsible for key management for its subgroup or class of users or class of
nodes. For achieving these two approaches are used local keys and a common key.
In local key one user act as class controller and rest of the users are members. Com-
munication done by class group key (CGK) used to secure intra class traffic and it is
shared between class controller and its class members. CGK is encrypted by KEK
key encryption key and distribute to class member. But in common key no interme-
diate operation takes place so beneficial over local key method in terms of compu-
tation, storage needed and bandwidth used [6][7][8].
ISBN :978-81-945631-7-4
127
Bouassida, Chrisment, and Festor[6] suggested that BAAL protocol for key dis-
tribution avoiding centralized administration and in [7] they proposed sequential
multisource model include localization and mobility hence optimizes bandwidth
consumption and energy.
Varadharajan, Hitchens, and Shankaran [8] worked on parallel and distributed
computing in ad hoc networks.
c) Distributed
In distributed group key management all the members of group should cooperate
to generate and distribute encryption key to make whole communication secure
[9][10][11][12][13].
T. Chiang and Y. Huang [9] proposed that how an user can compose a key in
multicast group and exchange using Diffie Hellman method.
Ingemarson, D. Tang, and C. Wong [10] worked on system of conference key.
Madhusudhanan, Chitra, and Rajan [11] proposed key management scheme based
on mobility.
Steiner, Tsudik, and Waidner[12] enhances Diffi Hellman scheme to highly dy-
namic environment for CLIQUES
Madhusudhanan, Chitra, and Rajan [13] suggested scheme for lowering down the
drop rate of packets and improves the confidentiality level by providing key man-
agement methods.
a) Access control based on Credential -If a user want an access to any resource
or data he require certain certificate information to gain access [14] [15].
Kaiwen,S.,Lihua,Y[4] proposed hybrid access control based on attribute.
Touti,l.,Challal,Y[15] worked on access control based on activity per-
formed by user. They used finite state machine and asymmetric encryption
algorithm.
b) Access control based on Attribute -If a user has some special kind of char-
acteristic can be called as attribute to gain access for certain resource or data
[29].
J. Meng, H. Wen, Y. Jiang Bin Wu and Y. Xie [29] proposed three layered
structure to provide secure access of resources using modified hierarchical
attribute based system.
c) Access control based on Capability -If a user want an access to any resource
or data must have some capability and a capability is an enforceable communi-
cable right mark-up which corresponds to a certain value that specifies unique
access rights to object possessed by subjects [16].
Li,F Han ,Y.,Jin,C [16] proposed a approach based on heterogeneous
ISBN :978-81-945631-7-4
128
encryption to provide access to different users for resources and also provide
security proof for this.
d) Access control based on Role-It is an identity based system to manage access
to different role players in system [17] [18] [19].
J. Q. Wen, and Hu C. Zhang [17] designed a system consisting of subsystem
for registration and user authentication, client handling and policy handling.
Wang J, Osborn SL [18] designed a role graph model, it group permission
into roles. By assigning role give set of permission to that user and grant ac-
cess.
Sandhu R [19] proposed three tier architecture based on multidimensional
concept ranges from simple one to complex model of RBAC.
e) Access control based on Trust -It is a lightweight authorization mechanism.
It is improved version of basic access control and involves value of trust factor
based on service quality, issues regarding security repudiation and social mat-
ters.
Bernabe, Ramos, Gomez [20] [30] [31] proposed access control system which
is multidimensional trust aware.
6 Summary
Analysis of all previous Hierarchical access control methodologies show that it is very
established area for research but still lot many things need to be unfolded. There is
much scope in development for efficient key management scheme to lower down
memory cost, computation cost, and communications cost and consider security aspects
like confidentiality, integrity and availability.
References
1) S. Zhu, S. Setia, S. Xu, and S. Jajodia, “GKMPAN: an efficient group rekeying scheme for
secure multicast in ad hoc networks,” Technical Report, 2004
3) T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, “Secure multicast groups on Ad Hoc net-
works,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Net-
works, pp. 94-102, 2003
ISBN :978-81-945631-7-4
129
5) R. D. Pietro, L. Mancini, Y. Law, D. Etalle, and P. Havinga, “LKHW: A directed diffu-
sion based secure multicast scheme for wireless sensor networks,” in International Confer-
ence on Parallel Processing Workshops (ICPPW‟03), pp. 397-406, Oct. 2003.
Aug. 2001.
9) T. Chiang and Y. Huang, “Group keys and the multicast security in Ad Hoc networks,” in
Proceedings of the 2003 International Conference on Parallel Processing Workshops
(ICPP 2003 Workshops), pp. 385, 2003.
10) I. Ingemarson, D. Tang, and C. Wong, “A conference key distribution system,” IEEE
Transactions on Information Theory, pp. 714-720, Sep. 1982.
11) B. Madhusudhanan, S. Chitra, and C. Rajan, “Mobility based key management technique
for multicast security in mobile ad hoc networks,” The Scientific World Journal, 10 pages,
2015.
12) M. Steiner, G. Tsudik, and M. Waidner, “CLIQUES: A new approach to Group Key
Agreement,” Proceedings of ICDCS'98, 1998
13) A. EL-Sayed, A new hierarchical group key management based on clustering scheme for
mobile ad hoc networks,” International Journal of Advanced Computer Science and Ap-
plications, pp. 208-219, 2014.
14) Kaiwen,S.,Lihua,Y., “Attribute role based hybrid access control in internet of things,” In
web technologies and application, pp 333-343 Springer,2014
15) Touti,l.,Challal,Y., “Activity based access control for IoT.,Proceeding of first International
Workshop on experiences with the Design and Implementation of smart objects,
ACM,2015
16) Li,F Han ,Y.,Jin,C. , “Practical access control for sensor network in the context of IoT” ,
Computer Communication,2016
17) Hu, C., Zhang, J Wen, Q, “An identity based personal location system with protected pri-
vacy in IoT”, IC-BNMT, 2011
18) Wang J, Osborn SL. A role-based approach to access control for XML databases. In:
SACMAT’04: Proceedings of the 9th ACM Symposium on Access Control Models and
Technologies. ACM Press; 2004. p. 70-77
ISBN :978-81-945631-7-4
130
19) Sandhu R. Role-based access control. In: Advances in computers. Academic Press;
1998. p. 238-87.
20) Bernabe,JB ,Ramos,J.L.H.,Gomez,A.F.S, “Multidimentinal trust aware access control sys-
tem for the IoT .Soft computing pp 1-17,2017
21) Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci Francesco Palmieri,, Aniello
Castiglione Xinyi Huang,”Cryptographic Hierarchical Access Control for Dynamic Struc-
tures”IEEE transaction june 2016
22) Y.-F. Chang, “A flexible hierarchical access control mechanism enforcing extension poli-
cies,” Security and Communication Networks, vol. 8, no. 2, p189–201, 2015.
23) E. S. V. Freire, K. G. Paterson, and B. Poettering, “Simple, Efficient and Strongly KI-
Secure Hierarchical Key Assignment Schemes,” in Topics in Cryptology - CT-RSA 2013
- The Cryptographers’ Track at the RSA Conference 2013, San Francisco, A, USA, Febru-
ary 25-March 1, 2013. Proceedings, ser. Lecture Notes in Computer Science, E. Dawson,
Ed., vol. 7779. Springer, 2013, pp. 101–114.
24) J. Lo, M. Hwang, and C. Liu, “An efficient key assignment scheme for access control in a
large leaf class hierarchy,” Inf. Sci., vol. 181, no. 4, pp. 917–925, 2011
25) M. S. Bouassida, I. Chrisment, and O. Festor, “Group Key Management in MANETs” In-
ternational Journal of Network Security, pp. 67–79, Jan. 2008
26) M. S. Bouassida, I. Chrisment, and O. Festor, “An enhanced hybrid key management pro-
tocol for secure multicast in Ad Hoc networks,” in Networking 2004, Third International
IFIP TC6 Networking Conference, LNCS 3042, pp. 725-742,Springer, May 2004
27) B. Madhusudhanan, S. Chitra, and C. Rajan, “Mobility based key management technique
for multicast security in mobile ad hoc networks,” The Scientific World Journal, 10 pages,
2015
29) Yuanpeng Xie, Hong Wen, Bin Wu, Yixin Jiang and Jiaxiao Meng, “A Modified Hierar-
chical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ,”
IEEE Transaction, 2014,pp 1-9
31) Matthew Campagna, and Shay Gueron “Key Management Systems at the Cloud
Scale”www.mdpi.com/journal/cryptography, Volume 2019, 1-16
ISBN :978-81-945631-7-4
131
Research Contribution on Hierarchical access control approach
ISBN :978-81-945631-7-4
132
San Francisco, A, generators(Dis- the partition, and the Forward secrecy-yes
USA, February 25- tributed) amount Backward secrecy-yes
March 1, 2013. Pro- of private infor-
ceedings, ser. Lec- mation depends on w, Scalability-Fair
ture Notes in Com- the poset width (which
puter Science, E. is equal to the number
Dawson, Ed., vol. of chains in the par-
7779. Springer, tition). Moreover, due to
2013, pp. 101– the cryptographic com-
114.[23] ponents used in
our constructions
(PRFs and FS-PRGs),
key derivation is rela-
tively efficient, growing
Linearly in h, the
number of levels be-
tween classes. In addi-
tion, our constructions
require
no public storage.
J. Lo, M. Hwang, proposed a new The computational The number of the Confidentiality-yes
and C. Liu, “An effi- key assignment complexity of the key selected prime numbers Integrity-yes
cient key assignment scheme for control- generation is usually in the system affects the Availability-fair
scheme for access ling Key deriva- proportional to the storage space of data,
control in a large leaf the access right in tion formula is number of primes. The the key generation time Dynamic-No
class hierarchy,” Inf. a large POSET (par- used computational and key derivation time. Security-Good
Sci., vol. 181, no. 4, tially ordered set) hi- complexity of this This scheme has a rela-
pp. 917–925, erarchy to reduce the scheme is the most effi- tively small amount of Robustness-Yes
2011.[24] required computation cient comparing with the prime numbers. Storage cost-private storage
for key generation other schemes. required but not public
and derivation with Key genera- The storage space Communication cost-less
the storage amount of tion formula is of secret key depends
data decreased. used on the access method. Reliability-yes
Both Akl–Taylor’s and Scalability-Yes
Harn–Lin’s schemes
assign the public Forward secrecy-yes
parameters directly, Backward secrecy-yes
Public pa- so that each class rec-
rameter Scalability-Yes
ords its own key and its
(Distributed) successors’ keys. but in
this only one key need
to store
M. S. Bouassida, Group key man- BALADE is completely To improve the per- Confidentiality-yes
I. Chrisment, and O. agement based on eliminating the formance of BALADE, Integrity-yes
Festor, “Group Key protocols for se- the dynamic overhead induced by we plan to Availability-fair
Management in MA- curing multicast com- clustering ap- the intermediate en- carry out the reliabil-
NETs” International munications in proach, using one cryption ity of the keys distribu- Dynamic-yes
Journal of Network ad hoc networks, traffic encryption and decryption op- tion process, Security-authentication, ac-
Security, pp. 67–79, considering the char- key, and sev- erations on the mul- in ad hoc environ- cess control, data confidentiality
Jan. 2008[25] acteristics and the cri- eral key encryp- ticast flow, ment, where the packets Robustness-Yes
teria of such environ- tion keys(Decen- while attenuating loss rate is not negligi-
Storage cost-public and pri-
ment, which are tralized) the “1 affects n” phe- ble. vate key, activities of LCs
nodes mobility nomenon. BALADE Communication cost-key
support, energy uses the OMCT (Opti- generation message and messages
efficiency and multi- mized Multicast Clus- to LCs
hop awareness. ter Reliability-yes
ISBN :978-81-945631-7-4
133
Tree) algorithm to Scalability-Fair
ensure an efficient and
fast group key delivery, Forward secrecy-fair
taking into account the Backward secrecy-fair
localization and the
mobility of nodes, Scalability-fair
and optimizing energy Efficiency-poor
and bandwidth
M. S. Bouassida, This protocol is Based on Lack of infrastruc- Still there are Relia- Confidentiality-yes
I. Chrisment, and O. enhanced architecture BAAL include ture and trust problem bility issue Integrity-fair
Festor, “An en- of BAAL which is threshold cryp- solved by threshold Availability-fair
hanced hybrid key valid for wired net- tography and cryptography
management proto- work AKMP Adaptive AKMP ensure Dynamic-yes
col for secure mul- Key management scalability and dy- Security-Good
ticast in Ad Hoc net- algorithm namicity Robustness-Yes
works,” in Network-
ing 2004, Third In- Storage cost-ACL, revoca-
ternational IFIP TC6 tion list and KEK per cluster
Networking Confer- Communication cost-OMCT
ence, LNCS 3042, group distribution
pp. 725- Reliability-no
742,Springer, May Scalability-Fair
2004[26] Forward secrecy-yes
Backward secrecy-yes
Scalability-Fair
Efficiency-Fair
B. Madhusudhanan, proposed the mo- Initially, the Session key based Group size increases Confidentiality-yes
S. Chitra, and C. Ra- bility based key man- nodes are catego- Encryption tech- control overhead in-
Integrity-yes
jan, “Mobility based agement technique rized according nique is utilized to creases
for multicast to their stability transmit a multicast Availability-fair
key management
Security in index which is data. The rekeying pro- Dynamic-yes
technique for mul-
ticast security in mo- MANET. estimated based cess is performed peri- Security-Good
bile ad hoc net- . on the link odically by the initiator Robustness-Yes
works,” The Scien- availability node The rekeying
Storage cost-ACL, revoca-
and mobility interval is fixed de-
tific World Journal, tion list and KEK per cluster
pending on the node
10 pages, 2015.[27] Communication cost-routing
category so that this
technique greatly mini- of all messages by CHs based on
mizes the rekeying reputation index
Reliability-achieved by peri-
overhead.
odic flooding
Scalability-good
Forward secrecy-yes
Backward secrecy-yes
Scalability-Fair
Efficiency-Fair
Computation complexity-
more number of encryption and
decryption
Jeddy Nafeesa Proposed dual en- Dual encryp- Proposed method Mainly focuses on Confidentiality-yes
Begum, Krishnan cryption algorithm to tion key one is manages information only interclass commu- Integrity-yes
Kumar, Vembu Su- implement Hierar- symmetric poly- and resources in a effi- nication Availability-fair
mathy, chical access control nomial and cient manner and scale Dynamic-yes
ISBN :978-81-945631-7-4
134
“Implementing using a software another is Tree well for large number Security-Good
Hierarchical Access agent based group Dif- of employee arranged Robustness-Yes
Control in Organiza- fie Hellman key under hierarchy and Storage cost-reduced
tions using Symmet- also decreases commu-
Communication cost-re-
ric Polynomials and nication cost and com-
duced
Tree Based Group putation time since
Reliability-achieved
Diffie Hellman modular approach
Scheme,” Advances Scalability-good
in Information Sci-
ence and Applica- Forward secrecy-yes
tions - Volume II, Backward secrecy-yes
pp. 645-651,
20042016 [28] Scalability-Fair
Efficiency-Fair
Computation complexity-
more encryption and decryption
ISBN :978-81-945631-7-4
135
A Review Identifying Effects of Minimum Quantity Lu-
brication (MQL) in Turning Process Using Conventional
Fluids and Nano Fluids
Vijay Teli1 and KedarInamdar2
1PG Student, 2Professor, Mechanical Engineering Department, Walchand College of Engineer-
ing, Sangli, Maharashtra, India
vijay.teli@walchandsangli.ac.in
1 Introduction
ISBN :978-81-945631-7-4
136
rial, at the point of shearing metallic bond breaks and bonding energy converts into
heat energy. The damage of microstructure has observed due to the excessive heat
generated.The excessive heat generated can damage the microstructure of the work-
piece material. Also, excessive heat affects the surface finish of the workpiece. To
reduce, the heat and friction the cutting fluids perform a very vital
role.Additionallycutting fluids works as a lubricant at tool-chip frictionpoint,results in
better tool life and increased surface finish ofthe workpiece.Every time the cutting
fluid is applied with sufficient pressure; this helps in keeping the cut chips aside from
the cutting zone.However, there are still some disadvantages to the usage of cutting
fluids, viz.cutting fluids adds cost in machining,and mostof them are not bio-
degradable and adds risk to thelabours at the machine shop [1].
In the year 2015 demand of lubricants was around 40 million tons worldwide,
which may reach up to around44 million tons in 2022. The field of industrial lubri-
cants can be split into several sections such as gear lubricant oils, hydraulic oils, and
engine lubricating oils. Currently cutting fluids utilize 5% lubricants and Asia is a top
consumer of cutting fluids [2].
Machining includes many costs such as tool changing cost, maintenance cost, the
cost for, location, the cost for waste, energy cost, etc. till the manufacturer reaches to
the finished workpiece. R. Avila notes that cutting fluids contribute to approximately
17% of the cost of machining whereas 4% cost is spent on tooling [3].
The Health and Safety Executive is aGoverning body from the United Kingdom is
responsible to promote, govern and implement the health, safety and welfare of the
workforce and research into occupational hazards in the UK. Health concerns includ-
ing breathing problems, skin problemsmayoccur if the cutting fluids were managed
improperly [4].
The process where CFs are disposed of has the largest environmental effects. The
disposal of cutting fluids affects the environment in different ways such as these fluids
carries harmful metals and chemicals along with them, reduces oxygen levels in the
water and also contains fat, grease from petroleum.
Harmful Metal.Initially cutting fluids are not contaminated with metal constituents
but, after used of these fluids they contain metal constituents along with them, these
fluids become harmful in many aspects because they contain heavy metals which may
cadmium, lead, chromium etc. The cost of disposing-off these fluids increases due to
the harmful metal contaminants.
ISBN :978-81-945631-7-4
137
Harmful Chemicals.Every cutting fluid contains at least one property out of combus-
tible, toxic, reactive and corrosive. Hence these fluids are potentially harmful to la-
bours and also when these properties are beyond a threshold value, they include envi-
ronmentally harmful chemicals. Hence these fluids need to be disposed of properly as
per the standard operating procedure.
Fat, oil, and grease (FOG).Fat, oil, and grease (FOG) are the contaminants present
in cutting fluids come from petroleum, vegetable or mineral sources. This FOG con-
tributes totaste, odour, and other appreciative problems in the water at comparatively
low concentrations. At high concentrations, these fat, oil, and grease contents are
hazardous to aquatic species [5].
Weinert et al. [6] have found the usage of cutting fluids has a serious impact on the
environment and operator health while using for machining and at disposal state.
Sreejith and Ngoi [7] have summarized that there should be no unnecessary use of
these cutting fluids. In addition to traditional cooling techniques, in recent years, sev-
eral other innovations have been introduced to extract heat of the cutting area. Sharma
et al. [8] examined multiple cooling methods for managing the temperature of the
cutting zone, including flood cooling, cryogenic cooling, minimum quantity lubrica-
tion (MQL), coolants with high pressure, solid lubricants, and compressed air/gas
coolants. They observed the machining costs and volume of lubricants can be signifi-
cantly reduced while maintaining the surface finish in a good range. Lawal et al. [9]
also reviewed various cooling techniques in the processes of machining and investi-
gated the impact of MQL using lubricants based on vegetable oil. Lawal et al. con-
cluded that the MQL technique is much better than other techniques.
ISBN :978-81-945631-7-4
138
shadowing effect of spray jet during machining. On the other hand inside the tool
system requires high investment cost, special tools and provides optimal lubrication at
the cutting point without spray loss. Operations such as drilling give better results
from inside spraying and other operations such as turning, milling gives better results
when the aerosol is supplied from outside.
(a) (b)
Fig. 1.(a)Inside the tool and (b) outside the tool spraying system.
ISBN :978-81-945631-7-4
139
3 Turning Process using MQL Technique
D.V. Lohar and C.R. Nanavaty [11]investigated the effect of turning on AISI 4340 steel by
applying commercially available cutting fluid where they found a 40% decrease in cutting
forces using MQL technique when compared with drylubrication and wet lubrication tech-
niques. Additionally found a 36% decrease in cutting temperature and 30% better surface fin-
ish. In turning of Inconel 750 with supercritical CO2 Stephenson D. et al. [12] concluded that
by using supercritical CO2 MQL has increased material removal rate (MRR) by 40% and in-
creased the tool life under some machining conditions compared to flood coolant.
ISBN :978-81-945631-7-4
140
tempera-
ture, Tool
wear and
Chip
morphol-
ogy
Patole P. AISI 4340 Ethylene 90 0.06 and 1 3, 4, 5, 6 and Surface
B. and glycol with 80, 140, 300, roughness
Kulkarni nano fluid, 500
V. V. Water with
(2018) nano fluid
Gunjal AISI 4340 Canola oil, 200, 220, 240 0.1 and 0.25 6 and 50 Surface
S. U. Coconut oil, rough-
and Patil Soyabean oil ness, Tool
N. G. life
(2018)
Pereira AISI 304 Canola oil 225 0.25 and 1.5 6, 15 and 100 Tool life
O. et al. with biode- behavior,
(2016) gradable Cutting
additives forces,
Surface
integrity
Joshi K. Inconel vegetable oil, 60, 80, 100 0.08, 0.12, 5 and 60 Surface
et al. 600 Vegetable oil 0.16 and 0.5, roughness
(2018) with nano 0.75, 1
particles
Mia M. hardened VG-68 grade 132, 163, 201 0.18, 0.22, ! and ! Surface
et al. and tem- straight cut 0.25 and roughness
(2018) pered high cutting oil 0.25, 0.5
carbon
steel
Carou UNS r.rhenus 200 0.1, 0.2 6 and 30 Surface
D. et al. M11917 NOR SSL and0.25 roughness
(2016) magnesium cutting fluid
alloy
Sartori alpha-beta Vegetable 80 0.2 and 0.25 7 and 200, Tool wear
S. et al. Ti6Al4V oil 4000 and Sur-
(2017) ELI titani- face in-
um alloy tegrity
Suresh AISI D3 Castor oil, 100, 150, 200 0.05, 0.07, ! and 300 Surface
R. et al. steel Palm oil, 0.09 and 1, rough-
(2016) Ground nut 1.5, 2 ness,
oil MRR,
Specific
energy for
ISBN :978-81-945631-7-4
141
CVD tool
Sharma AISI D2 SAE20W40 51, 78, 123 0.10, 0.15, 5, 6, 7 and ! Tempera-
P. et al. steel oil, .020and ! ture,
(2015) SAE20W40 Surface
oil with roughness
nanoparti-
cles
! Not mentioned
Su Y. et al. [14] examined the effects of vegetable oil, ester oils and both the oils with
the addition of nano-fluids on AISI 1045 steel bar and observed use of graphite oil-
based nano-fluid MQL decreased the cutting forces and cutting zone tempera-
ture.Using coconut oil and nano-fluid on AISI D3 steelBabu M. N. et al. [15] have
observed a decrease in surface roughness 85% than dry and 45% than oil cutting in
graphene nano-fluid MQL and decrease in cutting temperature 53% with dry cutting
and 32% with a wet cutting condition in graphene nano-fluid MQL condition. Patole
P. B. and Kulkarni V. V. [16] evaluated the performance of ethylene glycol with
nano-fluid and water with nano-fluid while turning AISI 4340 and concluded nano-
fluid executed a significant role in offering lower surface roughness, ethylene glycol
with nano-fluid proved much less surface roughness as correlated to water with nano-
fluid. Gunjal S. U. and Patil N. G. [17] have observedthe MQL technique used with
canola oil, gave better lubricating effect when used on AISI 4340 steel that coconut
oil andsoyabean oil. Table 1 sums the features of investigations on MQL in turning.
4 Conclusions
The theme of this paper is the analysis of important research available in the use of
the MQL technique during the turning process by using conventional cutting oils,
cutting oils made from vegetable oils, and nano-fluid based cutting fluids. It has also
given detailed information about the MQL system and has discussed its impact on the
finished workpiece in the turning process. The majority of the literature proved that
MQL turning is a better option instead of wet machining and also facilitates environ-
ment-friendly machining. From this literature review, the below-mentioned conclu-
sions can be drawn:
• Because of using very less quantity of cutting fluids, MQL saved much cost which
gets incurred during machining and during disposal of cutting fluids.
• The better surface roughness and much less tool wear can be obtained by reducing
cutting zone temperature by the efficient application of the MQL technique.
• Use of MQL technique is helped in decreasing in cutting forces.
• It is found that Supercritical CO2 MQL has increased material removal rate (MRR)
by 40% and enhanced the tool life.
ISBN :978-81-945631-7-4
142
References
1. Astakhov V., Ecological Machining: Near-dry Machining, Davim J. (Ed.), Machining
Fundamentals and Recent Advances. Springer, University of Aveiro,Aveiro, Portugal,
195-224, (2008).
2. Benedicto E., Carou D. and Rubio E., Technical, Economic and Environmental Review of
the Lubrication/Cooling Systems Used in Machining Processes, Procedia Engineering,
184, 99-116, (2017).
3. Avila R. and Abrao A. The effect of cutting fluids on the machining of hardened AISI
4340 steel, Journal of Materials processing Technology, 119, 21-26, (2001).
4. HSE and metalworking fluids, https://www.hse.gov.uk/metalworking/hse.htm#,last ac-
cessed 2019/12/09.
5. Skerlos S., Prevention of Metalworking Fluid Pollution: Environmentally Conscious Man-
ufacturing at the Machine Tool, M. Kutz, (Ed.) Environmentally Conscious Manufacturing
at the Machine Tool, John Wiley & Sons, Inc., Canada, 95-122, (2007).
6. Weinert K., InasakiI.,Sutherland, J. W. and Wakabayashi T., Dry Machining and Mini-
mum Quantity Lubrication, 53(2), pp. 511-537 (2004).
7. Sreejith P.S. and Ngoi B., Dry machining: Machining of the future, 101(1-3), pp. 287-291
(2000).
8. Sharma V. S., Dogra M. and Suri N. M., Cooling techniques for improved productivity in
turning, 49(6), pp. 435-453 (2009).
9. Lawal A., Choudhary I. and Nukuman I., A critical assessment of lubrication techniques in
machining processes: a case for minimum quantity lubrication using vegetable oil-based
lubricant, 41, pp. 210-221 (2013).
10. Tschätsch H., Applied Machining Technology, 8th edition, Springer Dordrecht Heidelberg
London New York, (2009).
11. Lohar D. and Nanavaty C., Performance Evaluation of Minimum Quantity Lubrication
(MQL) using CBN Tool during Hard Turning of AISI 4340 and its Comparison with Dry
and Wet Turning, Bonfring International Journal of Industrial Engineering and Manage-
ment Science, 3, 102-106, (2013).
12. Stephenson D., Skerlos S., King A. and Supekar S., Rough turning Inconel 750 with su-
percritical CO2-based minimum quantity lubrication, Journal of Materials Processing
Technology, 214, 673-680, (2014).
13. Suresh R.K., KrishnaiahG. and VenkataramaiahP., An Experimental Investigation with
Minimum Quantity Lubrication and its Comparison with Various Vegetable Oil Based
Cutting Fluids during Turning, Materials Today: Proceedings 4, pp. 8758-8768 (2017).
14. Su Y., Gong L., Li B., Liu Z. and Dandan C., Performance evaluation of nano-fluid MQL
with vegetable-based oil and ester oil as base fluids in turning, International Journal of
Advanced Manufacturing Technology, 83, 2083-2089, (2016).
15. Babu M. N., Anandan V., Muthukrishnan N., Arivalagar A. and Babu M. D., Evaluation
of graphene based nanofuids with minimum quantity lubrication in turning of AISI D3
steel, Springer Nature Applied Sciences, 1, (10), (2019).
16. Patole P. B. and Kulkarni V. V., Parametric Optimization Of Minimum Quantity Lubrica-
tion In Turning Of AISI 4340 Using Nano Fluids. In: International Conference on Materi-
als Manufacturing and Modelling, pp. 12419–12425,Materials Today: Proceedings,
(2017).
17. Gunjal S. U. and Patil N. G., Experimental Investigations into Turning of Hardened AISI
4340 Steel using Vegetable based Cutting Fluids under Minimum Quantity Lubrication.
ISBN :978-81-945631-7-4
143
In: 2nd International Conference on Materials Manufacturing and Design Engineering, pp.
18-23, Procedia Manufacturing, (2018).
18. O. Pereira, A. Rodríguez, A.I. Fernández-Abia, J. Barreiro and L.N. López de Lacalle,
Cryogenic and Minimum Quantity Lubrication for an Eco-Efficiency Turning of AISI 304,
139, pp. 440-449, (2016).
19. Joshi K. K., Behera R. K., Anurag, Effect of minimum quantity lubrication with Al2O3
Nanofluid on Surface Roughness and its prediction using hybrid fuzzy controller in turning
operation of Inconel 600, Materials Today: Proceedings 5, pp. 20660–20668, (2018).
20. Mia M., Morshed M.S., MdKharshiduzzaman, Mashrat H. Razi, Mostafa M. R., Rah-
manM.S., Ahmad I., Hafiz M. T. and Kamal A. M., Prediction and optimization of surface
roughness in minimum quantity coolant lubrication applied turning of high hardness steel,
Measurement 118, pp. 43-51 (2018).
21. Carou D., Rubio E.M., Lauro C.H. andDavim J.P., The effect of minimum quantity lubri-
cation in the intermittent turning of magnesium based on vibration signals, 94, pp. 338-343
(2016).
22. Sartori S., Ghiotti A. andBruschi S., Solid Lubricant-assisted Minimum Quantity Lubrica-
tion and cooling strategies to improve Ti6Al4V machinability in finishing turning, 118, pp.
287-294 (2018).
23. Sharma P., Sandhu B. S. and Sharma J., Investigation of effects of Nanofluids on turning
of AISI D2 Steel using Minimum Quantity Lubrication, 108 (part A), pp. 72-79 (2015).
ISBN :978-81-945631-7-4
144
Microgrid-A Future Energy Solution: Review
1,2
Master Candidate,1 Jabalpur Engineering College,
Jabalpur, Madhya Pradesh – 482005, India
3
Asst. Professor, 1 Jabalpur Engineering College,
Jabalpur, Madhya Pradesh – 482005, India
Keywords: microgrid control and management, renewable energy sources, grid-tie in-
verter.
1 Introduction
Microgrid is a micro model of the traditional energy grid. It has connection with the utility grid
by using a switch such that whenever any power disruptions occur on the main grid, the switch
disconnects the utility grid and the micro grid and maintains to deliver energy to the units (or
customers) linked to the micro grid. Thus, micro grids are useful for power distribution in emer-
gency cases as they can switch between on-grid and off-grid modes.[17]
Micro grid is an combined resources of those energy resources which can be renewable and su-
perior technology which distribute energy to the faraway regions having limited or no access to
power supply. It can also be used in cities, towns, hospitals, army bases and data centres for
emergency or alternative supply.[28]
A formal definition of microgrid is “microgrid is consist of the whole electrical distribution
system containingdistributed generators, distributed energy resources, energystoring devices and
controllable loads which can be controlled and coordinated in a way either in islanding mode or
grid connected mode”.[10]
Islanding means disconnecting from the main grid and working separately to give uninterrupted
power supply to areas connected to microgrid. Microgrids can thus act as a single unit.
ISBN :978-81-945631-7-4
145
By utilising maximum of solar energy and on windy days can utilise wind energy by running the
windmills. They are flexible, efficient, reliable, resilient and affordable and distribute and regu-
late power supply at a much faster rate than the conventional grid technologies. They are a de-
centralised network with integrated energy storage devices, control devices and protection units.
In India, we have Tirupati microgrid region of about 450 MW.[7]
Viewing the positive aspects of microgrid as an energy solution, we have major issues of
power quality and control and protection unit in the microgrid, which is further discussed.
2 Microgrid Classification
Depending upon the output voltagenatureused for the sensitive load, microgrids are classified as
follows:
a) AC microgridAC microgrid. A, B, C are radial feeders and loads are connected, which
combined together to form the distribution system. The feeders – A & Bare connected
to the micro sources where the sensitive loads are connected. The loads which arenon-
sensitive are not affected by the power quality issues on the grid, that is feeder C.[10]
b) DC MicrogridSome appliances which needs dc power it can be from the battery or by using
rectifier to convert ac to dc like mobile phones,TV, electric vehicle , laptops, etc use dc
power either from rectification of the ac source or from the battery. Eachappliance has an
adapter in which rectifier is embedded which rectify ac to dc to run them or to charge the
battery. The benefits of dc microgrid can be stated as follows:[10]
ISBN :978-81-945631-7-4
146
• Use of inverters in ac microgrid between dc load and dc appliances makes the effi-
ciency of dc microgrid higher.[16]
• In dc microgrid we don’t need tosynchronize utility grid and dc grid and alsoreactive
power compensation is not needed.[16]
ISBN :978-81-945631-7-4
147
A schematic is shown for centrally controlled micro grid. In LV stations controller is in-
stalled. Stability control cost managing function and other different functionalities are included
in this approach. The next controller is LC (load controller) located at Micro source controller
MC. Process of interruption of load like load shedding controls load. Active and reactive power
generated by the MSis controlled by MC Controller.[22]
ISBN :978-81-945631-7-4
148
Fig.5Diagram of DecentralizedControl Scheme.[6]
PCC information is shared between DGs of MG. DG which is close the PCC a communication
link is formed. DG which is closest to PCC will have power calculation block and PLL. When
MG is synchronized with utility grid, voltage and phase angle should reduced so that utility grid
voltage and MG voltage matches, at that time other DGs output is zero.[6]
For predetermined value of voltage and frequency VSI is used, output of inverter can be
adjusted to provide the control over real and reactive power.
Connected mode of microgrid for energy management is of main interest but microgrid is
operatedseparately in island mode. Voltage and frequency counter hold importance.AS shown in
below fig controller are of either power control mode or voltage control mode as maintained
earlier.
ISBN :978-81-945631-7-4
149
Fig.6Control scheme for DGs.[7]
In power control scheme
In power control scheme if any disturbance faced then micro grid can be made to operate
in island mode so connection to main grid is disconnected. Now controllers of DCP’s are now
controlled by modified voltage controller. All other remains controlled by power control mode.
After disturbance is cleared, DCP’s will now again connected to power control mode. [1]
ISBN :978-81-945631-7-4
150
because the system is not connected to the main grid.Now voltages have to regulate self. So,
output of VSI is regulated by voltage control scheme.
II. Microgrid research scenario: many countries in the world carried out their re-
searches in the field of microgrid. Some of the famous researches of the countries like in
US, Japan, Europe are mentioned below:
a) Research in US:
The famous institute of microgrid research inUS, CERTS, proposed the concept of mi-
crogrid. The CERT model consists of loads, small micro sources, power electronic
technologies with capacity less than 500KW. The laboratory of Wisconsin university
has successfully tested this concept. The America’s first microgrid project is the mad
river microgrid underetken by the northern part of the United states of power sys-
tem.[11]
ISBN :978-81-945631-7-4
151
Fig.9: CERTS Microgrid, schematic diagram [11]
b) Research of EU:
In 1998-2002, Europian Union’s 5th framework funded the pioneering research of mi-
crogrid. Athens National University of Science and Technology led this research pro-
gram, including 14 organizations from seven EU member states. [11]
c) Research of Japan:
The reality of increasing energy shortage and load led to the research in Japan.[11]
ISBN :978-81-945631-7-4
152
Fig.10 The Sendai Microgrid [11]
Grid-tie inverter (GTI) is used to implement microgrid systems but these systems are
weak without a grid. GTI needs power from the grid to operate and control.
In grid-forming control power settings, DER units are followed by another DER units
to maintain output voltage and frequency. These DER units should have a greater po-
tential energy. We thus adopt Droop control strategies to determine the allowable out-
put power according to droop characteristics given parameters that is voltage droop
and frequency droop. [13]
ISBN :978-81-945631-7-4
153
major concern in regard to the – dq reference frame and reso-
reliability of the power genera- nant controller in stationary ref-
tion scheme.[30] erence frame,
Active
and Reactive Power Control
Loop, these are some methods
to enhance voltage stability.
3 Conclusion:
This review paper presents an overall review of the microgrid, its control strategies and
future prospects. Microgrid seems to be an effective energy solution to meet the power de-
mands of the future. Alongwith improving the safety and reliability of the power supply,
microgrid can achieve higher efficiency. With the integration of smart technologies, mi-
crogrid will inevitably become direction of developing intelligence in the upcoming days.
References
ISBN :978-81-945631-7-4
154
6. AmbarnathBanerji,DebasmitaSen,Ayan K. Bera, DebtanuRay,DebjyotiPaul,Anu-
ragBhakat, ‘’MICROGRID : A Review’’, 2013 IEEE Global Humanitarian Tech-
nology Conference: South Asia Satellite (GHTC-SAS),15 Oct.2013.
7. Mohammad Reza Miveh Majid Gandomkar, SohrabMirsaeidi, Mohammad
Reza, Gharibdoost ‘’A Review on Protection Challenges in Microgrids’’ IEEE
trans. Protection 2012.
8. Abhishek Kumar, Akbar Hussain,Muhhad Zafar Ullah Khan,‘’Microgrids Tech-
nology: A Review Paper’’,Gyancity Journal of Electronics and Computer Sci-
ence, 2018, Vol 3, Issue 1, p. 11-20
9. Hartono BS ‘’Review of Microgrid Technology ‘’, 2013 International Conference
on QiR, 17 Oct.2013.
10. Ben Yu, Junke Gou Changxin Zhou, Zhiyong Gan, Jinshan Yu, Fei Lu ’A Review
of Microgrid Technology with distributed energy’
11. D. Mahinda Vilathgamuwa, Poh Chiang LohProtectionof Microgrids During
Utility Voltage Sags IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS,
A
ISBN :978-81-945631-7-4
155
22. Peng, F., Li, Y. and Tolbert, L. “Control and protection of power electronics in-
terfaced distributed generation systems in a customer-driven microgrid” 2009
IEEE Power & Energy Society General Meeting.
23. Joan Rocabert, Alvaro Luna, FredeBlaabjerg, Pedro Rodr´ıguez, “Control of
Power Converters in AC Microgrids”, IEEE Transactions on Power Electronics,
Vol. 27, No. 11, November 2011.
24. Chairman: Claudio A. Cañizares“Trends in Microgrid Control” IEEETransac-
tions on Smartgrid, Vol.5,No.4,July 2014.
25. Xiong Liu, Peng Wang, Poh Chiang Loh, “A Hybrid AC/DC Microgrid and Its
Coordination Control”, IEEETransactions on Smart Grid, Vol. 2, No. 2, June
2011
26. E. Barklund, NagarajuPogaku, Milan Prodanovic ´, C. Hernandez-Aramburo, Tim
C. Green, “IEEE EnergyManagementinAutonomousMicrogridUsing Stability-
Constrained Droop Control of Inverters”,IEEE Transactions on Power Electron-
ics, Vol. 23, NO. 5, September 2008
27. F. Katiraei, M. R. Iravani, “IEEE Power Management Strategies for a Microgrid
With Multiple Distributed Generation Units” IEEE Transactions on Power Sys-
tems, Vol. 21, No. 4, November 2006
28. E. Barklund, NagarajuPogaku, Milan Prodanovic´, C. Hernandez-Aramburo, Tim
C. Green, “EnergyManagementinAutonomousMicrogridUsing Stability-Con-
strained Droop Control of Inverters” IEEE Transactions on Power Electronics,
Vol. 23, No. 5, September 2008
29. Robert H. Lasseter Smart Distribution: Coupled Microgrids Proceedings of the
IEEE | Vol. 99, No. 6, June 2011
30. Joan Rocabert,Alvaro Luna, FredeBlaabjerg, Pedro Rodr´ıguez, “Control of
Power Converters in AC Microgrids”, IEEETransactions on Power Electronics,
Vol. 27, No. 11, November 2012.
ISBN :978-81-945631-7-4
156
Experimental Analysis of 3D Printed Patterns and
Conventional Pattern: A Review
Mr. Pradip B. Navale1 and Prof. Dr. Kedar H. Inamdar2
1Student, Dept. of Mechanical Engineering,Walchand College of Engineering, Sangli
2Professor, Dept. of Mechanical Engineering,Walchand College of Engineering, Sangli
pradipnavale7@gmail.com
1 Introduction
Most of the general steps in the modern casting sand process, including base, mold,
core and core container, are derived from part geometry, accompanied by
adjustments to provide different allowances. These initiatives provide new
opportunities to introduce additive manufacturing or 3D printing techniques for the
manufacture of sand molds. The manufacture of a metal casting should have to
consider the availability. The geometric freedom provided by AM technology is
therefore an essential asset which can be used in conjunction with traditional
processes. Contrary to the long history of traditional sand casting technology, just a
few decades ago additive manufacturing was emerging. Many of the 3D-printed
mold applications provide lightweight tooling for conventionally built castings.
Some pattern making shops have begun to embrace this AM technology as a better
method to check component designs and pattern designs. Along with gating
mechanisms, various shrinkage and draft allowances can be optimized. Until the
concept has been completed [1]. Metal Casting is one of the oldest manufacturing
processes and is now considered an art, rather than science. Metal casting has been a
primary method of manufacture since BC for many centuries, and is so still today in
the 21st century. In developing countries, the foundry industries suffer from low
ISBN :978-81-945631-7-4
157
quality and productivity due to the presence of multiple process parameters in casting
processes. Even in a fully regulated process, casting defects are found and hence
casting process is also known as uncertainty process that challenges explanation
about the cause of casting defects. Casting simulation has become a valuable method
for visualizing mold filling, solidification and cooling and for predicting the position
of internal defects, such as shrinkage porosity, sand inclusions and cold shuts[2].
Thanks to its economic characteristics the sand casting process is one of the
expandable mold methods and considered the most commonly used casting
technique. This method is used to manufacture around 70 per cent of all casting of
metal. The traditional method of casting the sand begins with pattern making.
Usually the patterns are made of wood, metal, plastic or other materials[3].
Various Casting Processes
i. Sand casting.
ii. Permanent mold casting.
iii. Investment casting.
iv. Lost foam casting.
v. Die casting.
vi. Centrifugal casting.
2 Literature review:
N. Hawaldar and J. Zhang [1] analyzed two processes to fabricate casting mold,
conventional sand casting process and additive manufacturing or 3D printing process,
are compared. The two processes were compared in terms of their weight saving,
surface finish design allowance and fettling work. The results show that there are
significant advantages in using additive manufacturing in the production of mold.
The 3D printed molds provide substantial saving of sand used, design allowances
and fettling work. The mechanical properties of 3D printed molds are also higher
than the conventional ones due to good bonding strength during 3D printing.
B. Ravi [2] stated that metal casting process, the development of tooling (pattern and
core-boxes) accounts for more than 70% of the lead-time for the first article of
ISBN :978-81-945631-7-4
158
approval [1], and greatly influences the cost and dimensional quality of the final
product. Much of this time is spent in tool design and process planning. A
combination of Intelligent Computer-Aided Design, Rapid Prototyping (RP) and
Rapid Tooling (RT) promises to reduce the tooling lead-time by 50%. Several RP
processes have been developed in the last ten years, including Fused Deposition
Modeling, Laminated Object Manufacturing, Stereo-lithography and Selective Laser
Sintering all of them based on slicing a 3D CAD model and fabricating it layer-by
layer.
M. C. Frank et al. [3] stated that the Rapid Pattern Manufacturing system developed
for the sand casting process. It involves both additive and subtractive techniques
whereby slabs are sequentially bonded and milled using layered tool paths. As such,
patterns are grown in a bottom-up fashion, both eliminating the need for multi-axis
operations and allowing small features in deep cavities. This system is specifically
targeted at large wood and sand casting patterns. This method introduces a new
support structure approach by integrating a flask into the pattern build process. In this
slicing algorithms that optimally place layer transitions to avoid thin sections near
flats, peaks, and valleys or where interaction with chemically bonded sand could be
problematic. Testing of the system in the development of next generation military
equipment is presented in a case study.
A. Rajput et al. [4] they compared Investment casting and conventional casting.
Investment casting also called the lost wax process or the precision casting process is
very different from conventional casting process. Quality parameters are important
considerations now a day in various fields where precision casting is required such as
aerospace, defence equipment, automobile, medical and dental instrumentation and
jewelleries. In this paper they compared conventional casting method with
investment casting method of same product on the basis of cost, quality and
dimensional accuracy[4]. The data is obtained by performing mentioned two methods
experimentally in the workshop; result comparison between data is showing that
investment casting gives high dimensional accuracy product with good surface
quality. The initial step of any casting method is gating system design for casting. In
this they conclude that a good casting mostly depends on the correct gating design
for achieving accurate casting product without time loss. So gating design is also
important while achieving good dimensional accuracy.
S. Kumar et al. [5] analyzed that study on various sand casting parameters which
affect the casting qualities. The following parameters affect the quality such as
Moisture, Green strength, Pouring temperature all this parameters affect the casting
defects and also shows the optimal settings of each parameter to reduce the casting
defects and improves the quality of castings at low cost. By the application of
Taguchi’s method to the green sand casting process, the productivity of the castings
produced increases and maintains the stability of the casting process. Before the
application of Taguchi’s method, the parameters of the casting process were more
arbitrary and it was difficult to set of their appropriate level and hence, the product
quality had instability problems. Taguchi’s method yielded optimized control factors,
resulting in superior product quality and stability.
R. Banchhor and S. Ganguly [6] concluded that industrial activities sand casting
process still remains as one of the most complex and indefinite activities. Due to the
complex relationship between casting defects and green sand properties, it is
ISBN :978-81-945631-7-4
159
imperative to control many green sand characteristics that influence casting quality.
Current test-- approach based on know- experience has many drawbacks such as
being non-, time-, error- and long- experimental necessity. This conventional method
needs to be replaced to manufacture higher quality casting items within a fair amount
of time, allowing better use of statistics, artificial intelligence. This paper extensively
reviews published research on green sand casting process. The effects of riser design,
gating system, molding sand, oxidation and deformation of casting during heat
treatment, machining allowance, etc., on the economical manufacture quality castings
were reviewed. Determining the optimum process parameter setting would
dramatically increase mold yield, metal production ratio, shorten manufacturing time,
save energy and money, minimize emissions, and enhance market
competitiveness[6].
A. Pranjal and A. Kuthe [7]studied that to bring about a revolution in Manufacturing
Rapid Prototyping (RP) method was used for making a prototype orpattern for
casting a product. A new method for investment casting was found outusing RP:
Fused Deposition Modeling (FDM). RP parts were also tested for usingthem as
patterns for sand casting. Software named “AUTOCAST-X” was used fordesigning
and simulating zero defect casting. This paper deals with the application of rapid
manufacturing techniques to save the time as well as cost ofmanufacturing of few
critical components of automobiles. A case study of Inlet manifold of engine and
Rotor of diskbreak is taken here to demonstrate the method.
S. Jauhar et al. [8] They analyzed capabilities to fabricate freeform surfaces, inbuilt
cores projections and supports are the unbeatable strengths of RP processes. The use
of benefits in terms costs have proved that the adoption of RP technology is techno-
economically justifiable for the Indian manufacturing industries. Rapid prototyping
have proved to be a cost-effective and time efficient approach for development of
pattern making, there by ensuring possibility for technology transfer in Indian
manufacturing industries. This paper deals with the application of rapid
manufacturing techniques to save the time as well as cost of manufacturing of few
critical components of automobiles. A case study of Inlet manifold of engine and
Rotor of disc break is taken here to demonstrate the method. While working on this
objective the aim will be to reduce the lead time required for tooling required for the
conventional block-type investment casting process. There are strong incentives to
reduce costs while increasing speed and accuracy in the current market. RP is an ideal
method when the components are complex in shape because it substantially
compresses the time for developing prototypes patterns and tooling[8].
ISBN :978-81-945631-7-4
160
3 Fused Depositions Modeling
Figure 1 indicate that the printing of pattern which is used in sand casting The
standard two-dimensional printer used to print paper from right to left along the x-
axis, and on the y-axis from top to bottom. The Z-axis up and down is used for 3D
printing. A scanner is used to construct an universal 3D printing file format, a digital
object file called the Standard Tesselling Language (STL).
ISBN :978-81-945631-7-4
161
5 Scope of Rapid Prototyping in Manufacturing
6 Acknowledgement
7 Conclusion
The study of this work is based on the comparison between conventional patterns and
3D printed pattern:
On the basis of cost comparison 3D printed pattern casting is more expensive than
conventional casting method due to its costly plastic material which is used for
pattern making. Based on quality parameter the 3D printed pattern is suitable to
use for sand casting.
References
ISBN :978-81-945631-7-4
162
BRIEF REVIEW: VOLTAGE STABILITY AND
POWER FLOW ENHANCEMENT BY UPFC AND
DPFC; AND COMPARISON OF FACTS DEVICE
mayankaroy100393@gmail.com
Keywords: UPFC, DPFC, voltage profile, active & reactive power, comparison of
FACTS devices
1 Introduction
The interesting part of planning transmission system with FACTS technology is, it
opens various parallel path for enhancing and controlling the power flow capacity, with
upgradation of system line. The opportunities of controlling various parameters of the
transmission system is through the competence of FACTS devices. FACTS controllers
restraint the parameter which are analogous. Hence, control the operation of each pa-
rameter of the transmission i.e series/shunt impedence, voltage, current, phase angle,
and oscillation damping at assorted frequency below the rated. By providing flexibility
through FACTS controller, it ensure the line to utilize power approximately to its ther-
mal power. It should be esteemed that FACTS is sanctionative automation and it is
neither a replacement of one-on-one automated switches.
In present power system; if we want to enhance the capacity with minimal cost of
generation, a very bright and useful technology has been acquaint in the world of power
system, very well known as FACTS. FACTS resemble i.e full form of FACTS
ISBN :978-81-945631-7-4
163
is‘Flexible AC Transmission System’; which is completely power electronic based au-
tomation, having various controllers for compensating different parameters.
The FACTS devices are considered boon due to its following advantages:-
a. Enhancement of transient and dynamic stability.
b. Voltage and power profile improvement.
c. Line compensation.
d. Power factor improvement.
The voltage volatility in any of the system arise due to lack of reactive power. The
inbuilt properties of FACTS controllers is to absorb or inject real power or reactive
power when needed, as a result which preserve voltage stability in structure. FACTS
controllers are characterized into following four types-
SERIES – SSSC, TCSC, TSSC, TCSR, TSSR etc.
SHUNT – SVC, STATCOM, TCR, TSC, TSR, etc.
COMBINED SERIES-SERIES – IPFC.
COMBINED SHUNT-SERIES – UPFC, DPFC.
2 Brief Review
Various analytic methods has been adopted for enhancement of voltage stability deter-
mination, power flow improvement which indirectly or directly enhance power quality
of the system as per requirement by application of FACTS controllers [5]. In paper
where and how FACTS controllers are implemented in distribution and transmission
structure along with there effects is been calculated [2]. How FACTS controllerwere
working in system has been discussed [1]. FACTS controllers are introduced in [6].
Power quality reinforcement in transmission structure by FACTS is demonstrated in
[7]. Comparison on the basis of characteristics of different FACTS has featured in
[4].
FACTS CONTROLLERS: A device based on power electronic and few static equip-
ment which controls various parameters of AC transmission.
ISBN :978-81-945631-7-4
164
current can varied. One of the important FACTS controllers based on volt-
age or current source converter; shunted with the system. STATCOM along
with storage device help to enhance dynamic characteristics and can also
used as active filter for harmonics. The figure of STATCOM without storage
is shown in fig (a), and with storage is displayed in fig (b)
Fig (a) and (b) STATCOM without storage and with storage device
ISBN :978-81-945631-7-4
165
Fig (c) SVC with various controller
ISBN :978-81-945631-7-4
166
Fig (e) SSSC with storage
3.3.1 UPFC (Unified power Flow Controller) – UPFC is well known for one of
best and versatile FACTS devices, having capability of infusing voltage in
series with the system, the voltage which is to be infuse may have any mag-
nitude and phase in comparison to the line voltage. UPFC basically has shunt
and series converter along with each three phase transformer. Both convert-
ers are regulated from a common DC link with a storage capacitor. The flow
of power is bi-directional in the two AC branches. Each converter can itself
absorb or generate reactive power at output branches [10]. In UPFC it also
has PWM(Pulse WidthModulation). The PWM modulation technique is
used for getting defined output voltage, help in reducing filters used, and
lastly to get instant dynamic response [10]. Inverter generate harmonics
which are attenuated by filter of second order, which in turn results in low
THD(TotalHarmonic Distortion) for transformer [11]. UPFC is compiled
form of a stagnant compensator & stagnant series compensator. It can sim-
ultaneously act as both shunt compensator and phase shifting device.)
ISBN :978-81-945631-7-4
167
Symmetrical three phase voltage with manageable magnitude and phase angle is in-
jected by the series inverter in series with line to control both active and reactive power
flow, hence it exchange both active & reactive power. Voltage across the storage ca-
pacitor is maintained constant by the shunt inverter and the restcapacity of shunt in-
verter could be used for swap of reactive power with the line for providing voltage
regulation. The detailed figure of UPFC is shown below with two voltage source in-
verters connected through transmission system with series and shunt transformer.
DPFC PRINCIPLE: By eradicating the common DC link and by apportion the se-
ries convert of UPFC we tried to increase the reliability and make the device economi-
cal. DPFC has one shunt converter which resemble STATCOM, and multiple series
connected converter, which use the concept of using various single phase less rated
converter in place of one huge rated converter. The converter in DPFC has its own DC-
capacitor which fulfil its requirement of DC-voltage and each converter is independent.
Along with converters it has one high pass filter shuntedon opposite side of shunt
ISBN :978-81-945631-7-4
168
converter in transmission line and at both the ends there are two star-delta connected
transformer. The setup of DPFC IS shown in fig (f), below
ISBN :978-81-945631-7-4
169
affect impedence
of line [13]
4 Experimental Analysis
ISBN :978-81-945631-7-4
170
5 Conclusion
This paper has presented a brief review of all FACTS controllers. The most versatile
device is UPFC but whose cost is quite expensive, which limit the practical application
where the voltage and power flow control is required simultaneously. Hence DPFC is
introduced which is cheaper and can be implemented more often. The reliability of
DPFC increases due to repeatedly use of series converters which reduces the probability
of error in the transmission system. When compared to other FACTS controllers the
performance of UPFC is found to be the best except cost and reliability, therefore by
looking from the point of view of DPFC it can figure out the problem of cost and reli-
ability as well.
Future Scope
References
[1] Singh, Mukesh Kumar, and Nitin Saxena."Performance Analysis and Com-
parison ofVariouFACTS Devices in Power System."July 2013, ISSN
No.(Online): 2277 2626(2013).
ISBN :978-81-945631-7-4
171
[5] M. P. Donsion , J. A. Guemes , J.M.Rodriguez, “Power Quality Benefits ofUti-
lizing FACTS Devices inElectrical Power System’’, IEEE 2007,26-29.
ISBN :978-81-945631-7-4
172
An informative analysis of Encryption algorithms using
quantitative Fitness Function
1 Related Work
This section gives us a brief overview of studies done in the past that are related to
the comparative analysis of data encryption algorithms. A thorough reading of papers
published on the above-mentioned topic has helped us to propose a unique and reliable
way for the analysis of cryptographic algorithms.
Authors of [1], have done a comparative analysis of three algorithms: RSA, DES,
and AES based on parameters like computation time, memory usage, output byte. These
are three prime parameters that give us a measure of the performance of any encryption
ISBN :978-81-945631-7-4
173
algorithm. The paper shows that DES takes the least encryption time among other al-
gorithms under study. RSA consumes the longest time to encrypt raw data.
There is a subtle difference between the encryption time of DES and AES algorithm.
From memory usage aspect AES outperforms the other two (RSA and DES) algo-
rithms. RSA has high memory usage but when it comes to output byte it gives cipher-
text of shorter length than the other two algorithms.
In [2], Alanazi and his other co-authors did a comparative analysis of three encryp-
tion algorithms (DES, 3DES, and AES). Factors under consideration were the key
length, block size, possible keys, cipher type, security, possible ASCII printable char-
acter keys and time required to check all probable keys at a rate of 50 billion keys per
second, etc. The authors came out with the result that AES is better than DES and
3DES.
In[3], Authors have focused their study on five data encryption algorithms (DES,
3DES, AES, RSA, and MD5) and done a thorough analysis of them by taking various
factors such as block size, key size, and encryption time/decryption time, possible keys,
etc. The paper concludes that AES has a greater edge over other algorithms under con-
sideration in terms of execution speed, time to break the algorithm and security.
The content in, [4] is based on performance analysis of various encryption tech-
niques used to implement multistage encryption and decryption of data being stored on
a cloud. Authors of this paper have tried different combinations of encryption algo-
rithms such as RSA & DES, RSA & AES, RSA & IDEA for multistage encryption and
they evaluated above-cited combinations in terms of encryption time performance. Ex-
perimental results of the paper suggested that RSA & IDEA gave higher performance
than other combinations.
Unlike any other theoretical comparisons [5], it has proposed a method of compar-
ing different cryptographic algorithms by analyzing trade-offs in their strength, weak-
ness, cost, and performance and then recommending the best algorithm which meets
the user requirements best. The authors took five algorithms: DES, 3DES, RSA, AES,
and BLOWFISH for their study. Various evaluation parameters considered in this paper
are encryption time, decryption time, memory used, Avalanche effect, entropy, number
of bits required for encoding optimally. Experimental results showed that BLOWFISH
has less memory requirement whereas RSA requires the largest memory among con-
sidered algorithms. RSA took the longest time to encrypt and decrypt while
BLOWFISH consumed the least time amongst all. When the evaluation was done on
the avalanche effect parameter it was observed that AES shows the highest avalanche
effect which makes it more reliable in applications where confidentiality is of para-
mount concern. Results also showed that BLOWFISH has the highest entropy i.e.
Blowfish has strong resistance against brute force attacks and AES requires the highest
number of bits to be encoded optimally an encrypted data and DES demands less num-
ber of bits be encoded optimally.
ISBN :978-81-945631-7-4
174
2 Algorithms in Consideration
2.1 AES
2.2 3DES
Triple data encryption standard (3DES) is an improvised version of the DES algo-
rithm it uses the sequential implementation of DES algorithm on the plain text three
times with three types of keys. Due to improvements in modern computers and high
computational powers, the old DES algorithm became prone to brute force attacks so
adding two more layers over the same algorithm made it enough complex. It uses a key
of 168 and 112 bits and 64-bit block size and 48 rounds.
2.3 BLOWFISH
BLOWFISH is a block cipher encryption algorithm, this algorithm is open source
with no patent and has a huge application base, this algorithm has a block size of 64
bits and has a variable-length key which varies from 32 bits to 448 bits, this algorithm
works on fiestal network. This algorithm was designed as a suitable replacement for
existing algorithms as a fast and secure algorithm.
2.4 TWOFISH
TWOFISH is a symmetric block cipher with 128-bit block size and key size up to
256 bits it was one of the top five finalists of the advanced encryption standard contest.
It is the next generation of blowfish algorithm; this algorithm also works on Feistel
structure like the blowfish algorithm.
ISBN :978-81-945631-7-4
175
2.5 IDEA
IDEA is a symmetric block cipher algorithm which operates on a 64-bit block with
a 128-bit key, this algorithm was used as a replacement for DES algorithm, it consists
of 8 identical rounds and provides decent security to the data.
This paper takes five main types of encryption algorithms into account for analysis,
these algorithms are thoroughly analyzed based on raw data and data collected from
previous researches. The algorithms are analyzed both qualitatively and quantitatively
over certain parameters which play a crucial role in defining the quality and nature of
an encryption algorithm. Furthermore, the comparative analysis of the undertaken al-
gorithms is quantified by a fitness function which represents all the crucial technical
parameters under consideration to give out a fixed value for each algorithm.
key size. is the amount of bits or bytes used to make a key for the algorithm to en-
crypt the data, key can be called an alphanumerical sequence which helps the algo-
rithm to frame the cipher from the plain text and the same key is further required to
descramble the ciphered data, key is nothing but a lock, different encryption algo-
rithms use different sized keys, some algorithms are flexible regarding size of keys
and have multiple options for size of keys, the size of key plays a very important role
in deciding the strength of an encryption algorithm we can say that the encryption
strength is directly proportional to the size of the key because as the length of the
key will be increased the chances of cracking the key by any means will be de-
creased.
ISBN :978-81-945631-7-4
176
quite difficult to decrypt, although having more number of rounds can increase time
overhead for the algorithm and it may be possible that for larger chunk of data the
algorithm may take a tremendous time to encrypt.
Encryption Time. Encryption time is the time required by the encryption algorithm
to encrypt the plain text to ciphertext, encryption time should be less as it reflects
the performance of the algorithm.
Decryption Time. Decryption time is the time required by the algorithm do decrypt
the cipher using the same key, this time must be less than encryption time, it also
depends upon the key size and the ciphertext size.
All the weights associated with the parameters are decided based on the priority of
that particular factor in the analysis of the algorithm.
ISBN :978-81-945631-7-4
177
We have given the most priority to the avalanche effect because the avalanche effect
defines the randomness of the ciphertext concerning the change in plain text.
Key is the second most prior thing in deciding the quality of the encryption algo-
rithm, the larger the size of the key the lesser it will be prone to brute force or other
attacks. Apart from key size and avalanche effect the block size and rounds of the iter-
ation are the aspects that describe the performance of the algorithm during the runtime
of encryption and decryption.
Encryption time and decryption time are system dependent and may vary with the
system configuration but relative values remain almost constant and encryption, de-
cryption time shows the significance of the performance of the algorithm, encryption
and decryption time are inversely proportional to the performance of the algorithm/
Data Interpretation. The data of encryption time, decryption time and avalanche ef-
fect shown below in table 1, had been obtained by running tests for different file sizes
and data strings respectively on an intel i5 9th generation processor clocked at
2.40ghz. we used NetBeans IDE for algorithm implementation using java cryptog-
raphy extension and bouncy castle API.
Table 1. Encryption and Decryption time of algorithms for different file sizes
10 KB 100 KB 1 MB 10 MB
ALGORITHM E D E D E D E D
(Ms) (Ms) (Ms) (Ms) (Ms) (Ms) (Ms) (Ms)
All the characteristic parameters are shown in table (2) depend upon the design of
algorithm some of the parameters have the flexibility to attain more than one value, we
have taken a single value of each parameter for more accurate and precise analysis and
the same values have been used for obtaining the dependent data.
Table 2. Value of various parameters of each algorithm used for testing and data generation
purposes.
ISBN :978-81-945631-7-4
178
The data tabulated in the above tables are further used for the calculation of the
fitness function. The values of the function are tabulated below (the values are rounded
up to their nearest integer values for convenience).
Fitness function
Algorithms (F)
10kb 100kb 1mb 10mb
AES 188 187 186 184
3DES 133 133 131 130
BLOWFISH 159 157 158 156
TWOFISH 185 184 183 182
IDEA 104 105 104 102
Figure 1 shows what the fitness function concluded: The best algorithm for encryp-
tion is AES for all the four ranges of data size the second one is TWOFISH algorithm,
ISBN :978-81-945631-7-4
179
as the fitness function is attaining the second-highest value for TWOFISH for all four
file sizes, the two fish algorithm was the finalist in advanced encryption standard con-
test the winner was AES algorithm after TWOFISH comes to BLOWFISH then 3DES
and then IDEA
Encryption time.
2000
1500
1000
500
0
10KB 100KB 1MB 10MB
As far as encryption time is concerned AES algorithm proves to be the least encryp-
tion time taking algorithm for all file sizes with the maximum value of 746ms for 10mb
file and 667ms for a 10 kb file. After AES, 3DES is the second least time taking en-
cryption algorithm with 990ms for a 10kb file and 1020ms for a 100kb file. In 1mb and
10mb file size blowfish is proved to be more efficient than 3DES.
ISBN :978-81-945631-7-4
180
Decryption time.
1200
1000
800
600
400
200
0
10kb 100kb 1Mb 10Mb
For decryption time AES tops the rest as it takes a minimum time 0f 202ms for a
10kb file to decrypt and a maximum of 500ms for a 10mb file to decrypt. After AES
there is a 3DES algorithm that has the second least decryption time for 10kb and 100
kb file range and then blowfish for 1mb and 10 Mb file range. 3DES takes the highest
value among all others in the 10 Mb file range.
80
70
60
50
40
30
20
10
0
avalanche effect
AES 3DES BLOWFISH TWOFISH IDEA
ISBN :978-81-945631-7-4
181
The highest avalanche effect is shown by the AES algorithm with 73% and then the
second-highest avalanche effect is shown by the TWOFISH algorithm with 70% after
TWOFISH there are BLOWFISH, IDEA and then 3DES, the least avalanche effect is
shown by 3DES of 55%.
200
180
160
140
120
100
80
60
40
20
0
AES 3 DES BLOWFISH TWOFISH IDEA
As per the average values of the fitness function, we can say that the AES algorithm
is the best encryption algorithm with the value 186.25, and the one with the least value
i.e. IDEA is least preferable encryption algorithm.
ISBN :978-81-945631-7-4
182
5 Conclusion and Future Work
We conclude that we have proposed a noble approach for the comparison and anal-
ysis of the algorithm using Fitness function. Accordingly, AES has proved to be the
best encryption algorithm when compared overall. The rating of each of the algorithms
is done based on the average value of fitness function.
The work carried out on the various algorithms will help any technical or nontech-
nical personality to understand the significance of encryption algorithm in the field of
data security, the analysis carried out here based on the quantization of characteristic
parameters can be stretched to a new level of limits which can include space complex-
ity, byte entropy and many other factors which can describe the algorithm more accu-
rately and precisely. As mankind has now taken the computational power to a new level
where there is a threat to the stored data, and thus there is a need to make it more secure
and protected, encryption algorithms play a key role in the protection of the digital data.
The algorithms are in a need of refurbishment and reanalysis, the work carried out here
might be just a step, there are a lot more things to do.
References
1. Seth, S., Mishra, R.: Comparative Analysis Of Encryption Algorithms For Data
Communication. International Journal of Computer Science and Technology. 2, 292-
294 (2011).
2. Alanazi, H., Zahidan, A., Bahaa, B., shabbir, M., Al-Nabhani, Y.: New Comparative
Study Between DES, 3DES, and AES within Nine Factors. Journal of Computing.
2, 152-157 (2010).
3. Chennam, K., Muddana, L., Aluvalu, R.: Performance analysis of various encryption
algorithms for usage in multistage encryption for securing data in the cloud. 2017
2nd IEEE International Conference on Recent Trends in Electronics, Information &
Communication Technology (RTEICT). (2017).
4. Joseph, D., Krishna, M., Arun, K.: Cognitive Analytics and Comparison of Symmet-
ric and Asymmetric Cryptography Algorithms. 4th National Conference on Recent
Trends in Information. 6, (2015).
5. Patil, P., Narayankar, P., Narayan D.G., Meena S.M.: A Comprehensive Evaluation
of Cryptographic Algorithms: DES, 3DES, AES, RSA, and Blowfish. Procedia
Computer Science. 78, 617-624 (2016).
ISBN :978-81-945631-7-4
183
Multilayer Perceptron Using TFIDF for News Category Classification
Shivam Pandey1, Mrityunjay Singh2 and A K Shukla1
1Bundelkhand Institute of Engineering & Technology Jhansi, U.P., India
2Jaypee University of Information Technology, Waknaghat, Solan, H.P., India
1. Introduction
Text classification is the mechanism through which one can allocate one or more specified
categories to text files that makes user to easily access useful information rapidly by
looking for the specific categories only instead of searching in complete whole knowledge
space. The text classification is more significance when we want to retrieve information
from a massive knowledge space, e.g., World Wide Web [1][2][3]. There are many
machine learning algorithms are available for the text classification such as artificial
neural network (ANN), Support Vector Machine (SVM) etc. The ANNs consist of various
nodes that simulate human brain having biological neurons; these neurons are connected
with each other and interact with the help of connected links. The nodes take data as input
and perform elementary data operations; the output elementary data operation is called
node or activation value for each node. These activation values are given as an input to
other neurons [4].
A perceptron is a linear classifier that generates a single output based on various real
examined inputs by forming a linear activation using its input weights (and sometimes the
ISBN :978-81-945631-7-4
184
output is passed by a nonlinear activation function). This is how it is written in
mathematics:
Where w is a weight vector, x and b denotes input vector and bias respectively, and is a
non - linear activation function.
A multilayer perceptron (MLP) is a deep neural network with multiple perceptron. MLP
consist of an input layer for receiving the input signals, an arbitrary number of hidden
layers that having the most significant computing power, and an output layer for
prediction with respect to the given input. In order to minimize the errors, we train the
MLP network by adjusting the model's parameters or weights and biases. We use the
backpropagation algorithm to adjust the weight and bias with respect to the error; this
error can be calculated using various methods such as root mean squared error (RMSE).
In this work, we are provided with a News dataset consisting of News Headlines, News
description and the Category of each Document (News). Our task is to design a model
capable of correctly detecting News categories.
● Design a model capable of analyzing data and metadata related to each News headline and
assigning a category to the headline.
● Each entry has a news headline and a category among others.
● The model thus trained should be able to generalize to a set of not-yet annotated News
Headlines: The model is expected to predict the correct News Headline category of data
not necessarily belonging to the same source of the News Headlines dataset.
● Our task is to identify the category of a news headline from a fixed category set.
2. Related work
Ribana Roscher et. al. (2009) have introduced Bounded Logistic Regression (BLR) to
addres convex optimization problem; this techniques is the extension of logistical
regression problem. The authors have compared their work with support vector machine
(SVM) classifier, and test the accuracy of BLR's on nine well-known datasets [5].
Liang C. Yu et al. (2013) have proposed a conceptual entropy model for the online stock
market news articles to enhance seed words by evaluating similar sentimental words and
their respective severity. Using an entropy measure, they covered the relevance of their
conceptual distribution between seed words and applicant words. Their approach was
regarded as both conceptual distribution and co-occurrence strength, thereby encouraging
more relevant sentimental words, less noisy words and exceeding Point-wise Mutual
Information (PMI) that conceives co-occurrence [6].
Yanghui Rao et al. (2014) present an algorithm and pruning strategy to create a word level
sentiment dictionary for social sensitivity detection. In the dictionary, the words are
associated with a special exemption for a series of human feelings and also added a topic-
based modeling method for building a topic-level dictionary in which social sentiments
ISBN :978-81-945631-7-4
185
are associated with each topic. The approach-generated dictionary is fine grooved, volume
unbounded and language independent when compared to other lexicons. The final
dictionary has several applications such as predicting news articles, distributing emotions,
etc[7].
Limeng Cui et al. (2014) have introduced a hierarchy model based on LDA and SVM, and
introduced a topic model that has significance for news classification; they introduced the
SVM concepts by adjusting the algorithm parameters [8].
Shivam Pandey (2017) extended the issue of classifying the genre of different English
novels with the help of different Natural Language Processing and Machine Learning
methods. The genres that have been taken are some of the most widely read genres of
book among different age groups. Using the different linguistic feature to obtain
representative features for the genres. The training module uses the feature Datasets to
provide the base for classification feature [9].
3. Methodology
In this work, we use anaconda 4.6.11 with spyder 3.3.2, python version 3.7.1, Keras 2.1.6
(with TensorFlow backend). Along with this, we have also installed a few needed python
packages like numpy, scipy, sci-kit-learn, pandas, ntlk, spacy, etc.
The whole process is divided into parts first carrying out the cleaning process using
natural language processing then a calculation of frequencies for all keywords [10] and
lastly doing the training part using neural networks for prediction of news article’s
category.
We would not go directly from raw text to fit a machine learning or model of deep
learning. We therefore first clean our text, which means separating it into words and
processing punctuation and case. We mainly used two python libraries nltk and spacy for
natural language processing. Nltk is a library for string processing. Strings are required as
input and strings are returned output. Whereas, spacy returns a document object whose
words and sentences are objects themselves.
ISBN :978-81-945631-7-4
186
Fig.1 Example of removal of accented characters [11].
Our text preparation steps are removal of accented characters, expanding contractions,
removing special characters, stemming, and removing stop words. In the first step, we
convert the accented characters into ASCII characters and standardized them as shown in
Fig.1. Expanding Contractions step, we convert contraction to its expanded form, the
original form helps with text standardization, e.g., don’t to do not and I’d to I would etc.
Removal of Special Characters step,the Special characters and symbols are removed using
simple regular expressions (regexes) that usually add extra noise in data that can be non-
alphanumeric characters. In Stemming step, the words are converted to their base forms.
Finally, in Stopwords removal step, the Words with little or no value are generally words
with the maximum frequency. These can typically be articles, prepositions, conjunctions,
etc. A, an, the, and, the like are some examples of stop words. Fig.2 exhibits an example
of removal of stopwords from a small paragraph, and it is converted to its clean form
using all these functions[11].
Fig.2 Example of a paragraph converted to its clean form using Natural Language
Processing [11].
Here we are using 5 newsgroups dataset containing around 2000 data which we have
taken from AI Academy Intermediate Class Competition, Kaggle. The categories are as
shown in Fig.3 and Fig.4 shows a comparison of the number of values for each category.
Fig.3 Number of news headlines for each news category in our dataset.
First of all, we import all the required packages [12] then load data to python variables
then we split data for training and testing 80% and 20% respectively. The variables of our
model are training data, testing data, numbers of labels, etc. are shown in Fig.5. Then
tokenizing and preparing of vocabulary comes into action, we are using Bag of Words
method [13] and now the Keras comes with its inbuilt tokenizer which converts text to
numeric vector based on tfidf.
ISBN :978-81-945631-7-4
187
After converting text to numeric vectors, to make sure our labels in the numeric format are
accepted by neural network we need to convert them to one hot vector for which we use
sklearn’s LabelBinarizer class which converts multi-class labels to binary
class[14][15][16].
We combine the probability distribution (Pr) with a fraction of records related to each
class. In order to avoid underflow, we use the sum of logs:
ISBN :978-81-945631-7-4
188
One issue is that, for the repeating words, the probability will increase. In order to address
this issue, we take the log of the frequency for its smoothing:
Next, we add an Inverse Document Frequency (IDF) weight on each word in order to take
stop words into account:
For this use case, we have already set the stop words to 0 and add the IDF implementation
to generalize the function. As we can see, the IDF has little effect on the removal of the
stop words. Smoothing, however, makes the model more accurate. Therefore, our optimal
model is:
Keras is a high-level neural network API written in Python that has ability to run on the
top of Tensorflow. Therefore, we use Keras API for training purpose. We use the
following steps:
1. Keras Sequential Model: the Keras sequential model is a linear stack of layers. In this
work, we use three layers with softmax as the activation function.
2. Input Shape: We use 2D layers, such as dense layer and take vocab size of 10000 as input
shape.
3. Compilation: We need to configure the learning process before training our model, which
is performed using the compile method, the compilation method requires three arguments
as an input, these arguments are:
• Loss Function: We use cross-entropy classifier function to minimize the two distributions:
the estimated distribution q(x), and the true distribution p(x), defined over the discrete
variable x. the cross-entropy classifier function is given by
ISBN :978-81-945631-7-4
189
• List of Metrics: A metric can be an existing metric string identifier or a custom metric
function. It is set to accuracy for any classification.
4. Training: we train the Keras models on input data, numpy arrays, and labels. We use the fit
function for training with validation split of 0.2, batch size of 100, and 5 labels.
5. Evaluate: Returns the loss and metric value for the model in test mode. Computation is
done in batches.
6. Predict: It generates output predictions for the input samples [17].
We build the model, by taking 1780 samples for training and 445 to validate, then fit it
and save the trained model. Figure Fig.5 shows the number of datasets for training and
validation.
Fig.5 Variables in the model like the number of labels, test data, train data, etc.
5 Results
When the model is trained on 1424 samples and validated on 356 samples we obtained the
training accuracy of 97.75 % whereas test accuracy of 96.85% which is shown in Fig.6.
ISBN :978-81-945631-7-4
190
The ANN model thus build predicts the categories like entertainment, technology,
business, politics, sports correctly which is evident by the screenshots of the outputs. The
predicted labels for the news input by the user are shown in the following figures like in
Fig.7 an input is given for a news description taken from a news article of Bollywood on
the internet and the output i.e. predicted label obtained is of the category, entertainment.
Similarly for the news description of growth in chemical and engineering sectors gives the
predicted label, business in Fig.8 and for the news article related to elections, it gives the
category, politics as shown in Fig.9 and likewise it shows the categories of sports and
technology for respective inputs.
By examining these outputs we observed that predicted categories by the model for the
given inputs of news description are correct.
6 Conclusion
ISBN :978-81-945631-7-4
191
In this work, we use the multilayer perceptron, a deep learning based artificial neural
network for news category classification. We conclude that the ANN model thus trained is
an efficient model as examined by performance metrics like Precision, recall and F1 score
as shown in Fig.10. Here we find a very low variation in the values of precision and recall
for all the categories and all the values in precision, recall, and F1 score are nearly 1 or
equal to 1 which shows the effectiveness of the model.
Fig.11 shows the confusion matrix that summarizes the performance of our classification
model. Here the total number of correct predictions for a class goes into the expected row
for that class value and the predicted column for that class value.
Lastly, the complete classification report in Fig.12 which shows the summary of all the
performance measures that are stated above.
ISBN :978-81-945631-7-4
192
Fig.12 Classification report for the ANN Model
Future works will focus on other neural network models like Long Short Term Memory
Units (LSTMs), Backpropagation and feedforward algorithms. Even better results are
expected since they are more optimized for learning sequential data. Other future works
will focus on distinguishing fake news from real news using convolutional neural
networks, it can be implemented for online news classification or for customizing articles
reading online experience by classifying them as interesting or non-interesting with more
improvements with methods and precision. Therefore, it can enhance the experience of
reading news online by making it more real, precise and personalized.
Acknowledgements The authors wish to place on record their sincere thanks to the
referee for his valuable comments and suggestions. The authors would like to thank to
AICTE for financial support under the project No. 1-57738052191, under CRS scheme by
AICTE.
References
1. Chan Chee-Hong, Sun Aixin, Lim Ee-Peng: Automated Online News Classification with
Personalization, Center for Advanced Information Systems, Nanyang Technological
University Nanyang Avenue, Singapore, 639798, (2001).
2. Jayanthiladevi A., Murugan S., Manivel K.: chapter 18 Text, Images, and Video Analytics
for Fog Computing, IGI Global, (2018).
3. Wei Yu-Chen, Lu Yang-Cheng, Chen Jen-Nan, Hsu Yen-Ju: Informativeness of the market
news sentiment in the Taiwan stock market Published in: The North American Journal of
Economics and Finance, Volume 39, pp: 158–181, January (2017).
ISBN :978-81-945631-7-4
193
4. Ai-Sun, Li Yingjian, Huang Yueh-Min, Li Qiong, Lu Guangming: Efficient facial
expression recognition system based on geometric features using neural network,
Information and Communication Technology for Sustainable Development, Springer,
Singapore, page 181-190, (2018).
7. Rao Yang hui, Lei Jingsheng, Wenyin Liu, Li Qing, Chen Mingliang: Building emotional
dictionary for sentiment analysis of online news, Published in World Wide Web, Issue 4,
Volume 17, pp: 723–742, July (2014).
8. Cui L., Meng F., Shi Y., Li M., Liu A. : A Hierarchy Method Based on LDA and SVM for
News Classification, in Proc. 2014 IEEE International Conference on Data Mining
Workshop, ICDM Workshops 2014, pp: 60-64, Shenzhen, China, 14 December (2014).
10. Singh Amritpal, Chhillar Sunil Kumar: News Category Classification Using Distinctive
Bag of Words and ANN Classifier, International Journal of Emerging Research in
Management &Technology ISSN: 2278-9359 (Volume-6, Issue-6), (2017).
11. https://towardsdatascience.com/a-practitioners-guide-to-natural-language-processing-part-i-
processing-understanding-text-9f4abfd13e72.
12. Sarkar Dipanjan, Bali Raghav, Sharma Tushar: Practical Machine Learning with Python,
Springer Nature, (2018). https://doi.org/10.1007/978-1-4842-3207-1.
13. Li-Juan Z., Feng Z., Qing-qing P., Xin Y., Zheng-tao Y.: A classification method of
Vietnamese news events based on a maximum entropy model, in Proc. 2015 34th Chinese
Control Conference (CCC), ISBN: 978-1-4673-7443-9, pp: 3981-3986, Hangzhou, China,
28-30 July (2015).
14. Tripathi Ankita, Pandey Shivam, Jangir Hitesh: Efficient facial expression recognition
system based on geometric features using neural network, Information and
Communication Technology for Sustainable Development, page 181-190, Springer,
Singapore, (2018).
15. Sebastiani F.: Machine learning in automated text categorisation: a survey, Technical
Report IEI-B4-31-1999, Istituto di Elaborazione del l'Informazione, Consiglio Nazionaled
elle Ricerche, Pisa, IT, 1999.Revised version, (2001).
ISBN :978-81-945631-7-4
194
16. Kiliç E., Tavus M. R., Karhan Z.: Classification of breaking news taken from the online
news sites, in Proc. 2015 23rd Signal Processing and Communications Applications
Conference (SIU), ISBN: 978-1-4673-7387-6, pp: 363-366, Malatya, Turkey, 16-19 May
(2015).
17. https://keras.io/getting-started/sequential-model-guide/
ISBN :978-81-945631-7-4
195
ISBN : 978-81-945631-7-4
Published by
FAI Publications
www.faipublications.com